Skip to main content

Internal Scanners

info

The Internal Scanners feature is available only for the VRMS and Penetration Testing products. Additionally, your subscribed plan must have the Internal Scanners feature enabled.

Overview of Internal Scanners

Internal Scanners are lightweight applications that you download and install inside your own network (on-premise or private infrastructure).

They allow you to:

  • Run internal vulnerability scans (VRMS) or internal penetration tests without exposing your network to the public internet.
  • Scan internal IP ranges that are not publicly accessible
  • Securely connect your internal infrastructure to the Scanning Solution platform

Each Internal Scanner:

  • Registers securely with your scanning solution account
  • Connects through the Scanners Gateway
  • Can be enabled for one or more subscribed products (VRMS and/or Penetration Testing)

This design allows you to maintain full control of your internal environment while leveraging the centralized reporting and management capabilities of the Scanning Solution.

How Internal Scanners Work

  1. You create a new scanner from the Scanners page.
  2. The platform generates:
    • Authentication credentials
    • Two dedicated ports
    • Gateway connection details
  3. You install the scanner inside your network.
  4. The scanner establishes a secure tunnel to the Scanners Gateway.
  5. Once connected, it becomes available for internal scans.

Setting Up and Configuring Internal Scanners

Step 1 — Create a New Scanner

  1. Navigate to Menu → Scanners
  2. Click on New Scanner
  3. Fill out the form:
    • Name: Choose a descriptive name for your scanner (e.g., "Office Network Scanner")
    • Description: Optionally, add details about the scanner's purpose or location
  4. Click Save.

Step 2 — Review Scanner Configuration Details

After the scanner is created, you will see its configuration details:

🔐 User & Key

These are the credentials used by the scanner to authenticate with your portal.

  • User → Scanner authentication username
  • Key → Secret key used for secure connection

⚠️ Keep these credentials secure. They are required during the scanner installation process.

Management Port & Scanner Port

Two random ports are generated:

  • Management Port

    • Used for secure management communication
    • Handles control and orchestration commands
  • Scanner Port

    • Used for scan traffic communication
    • Transfers scan data securely

    Each scanner has its own dedicated ports to ensure isolation and security.

Step 3 — Configure the Scanner in Your Network

Based on your endironment, find, download and follow the installation instructions for your scanner from the following link Scanner Installation Instructions.

Best Practices

  • Install the scanner in a secure and stable environment.
  • Avoid exposing the scanner directly to the internet.
  • Restrict outbound access to only the required gateway.
  • Monitor scanner health regularly.
  • Use separate scanners for different network segments if required.