2

I have recently set up OpenVAS on my local office network. I have run a few tasks but I was curious on what tasks I should really be running and within what timeframes?

clarification

I'm currently going through Cyber Essentials and essentially just need to know what vulnerabilities I have and what assets are on my network. But again I'm unsure if I should be doing anything more other than just these two.

Any help would be great

OliverBS
  • 445
  • 5
  • 14
  • At the moment this question is a bit too generalised to be easy to answer. You might get a better answer by providing some more detail on what your security goals are and what it is you're looking to get out of the scans. – Rory McCune May 22 '17 at 12:15

1 Answers1

2

There's a couple of different approaches you can take with Vulnerability scanners like OpenVAS and they'll produce somewhat different results.

Uncredentialed scanning, you just provide the IP addresses and the scanner assesses what it can from the network perspective. What it's doing under the covers is completing a port scan and then assessing against a database of known issues for the ports that it finds as open.

You can also provide credentials to the scanner, which allows it to sign into the system and review the configuration and software installed to find more vulnerabilities. this approach will produce a lot more findings as it'll pick up things which aren't visible from a network perspective. However this depends on the scanner knowing about the device/OS to be reviewed, some scanners have better coverage here than others.

VA scanners can also sometimes identify new vulnerabilities by doing things like fuzzing web applications, but it's worth noting that this carries some degree of risk that the applications scanned will react poorly.

If you're looking to improve your security I'd recommend credentialed scanning as part of your security programme. It finds more issues and tends to have fewer false positives.

If your goal is more compliance oriented, then probably best to start with matching the scanning that the auditor will complete and make sure you address all the issues from that.

Rory McCune
  • 60,923
  • 14
  • 136
  • 217
  • 1
    really basic question here but when you run a credentialed scan would it be sensible to create a user on each host specifically for the scan to use? – OliverBS May 22 '17 at 15:59
  • 1
    yes I'd recommend having a dedicated user for the scanning, and obviously be very careful with the creds, as they'll need to have quite a lot of rights to execute the scans properly. If you've got a good centralized auth. management and it's not too painful, you could also disable the account when it's not in use. – Rory McCune May 22 '17 at 17:50