Start Scanning for Policy Audit
Scan your hosts to check the compliance of your systems against your policies. You can easily add policies from our library, or create your own.
A few things to consider... |
Have you thought about which hosts you want to scan and which options you want to use? We can help you sort this out quickly - review the basics for some ideas. |
Got your policies and controls ready? |
Add compliance policies that you want to report onA policy is a collection of controls related to the technologies (operating systems and applications) and the IP addresses you want to scan. We recommend you add one or more policies now. How do I add a policy? You can import a policy from our library, or create your own. Go to Policies > New. You need a policy in order to create compliance reports based on your compliance scan findings. |
Do you want your scan to test user defined controls for compliance?Technical controls are the building blocks for compliance policies. You can create user defined controls to meet your audit requirements. Learn more about User-Defined Controls. We test all controls in the controls library at scan time. If you want to test for user defined controls you must add them before scanning. |
Do you want to add Auditor users?You might want to add Auditor users to help with policy creation and management. Auditors have permissions to create compliance policies for the subscription, create compliance reports and manage exception requests. How do I create Auditors? Any Manager can create Auditors. Just go to Users > New > User. |
I'm ready to start my scan. What are the steps? |
It is simple to start your scan. Go to Scans > New > Scan (or Schedule Scan), and tell us: 1) which IPs to scan, 2) which scan options to use, and 3) which scanner is right for the job (if you have scanner appliances that is). |
Choosing an option profileA compliance option profile provides the settings used for a compliance scan. We recommend you use the profile Initial PA Options to get started. By creating your own profile, you can fine tune settings. |
I started my scan. What's next? |
The following section describes how to prepare for and manage a compliance scan—from adding compliance policies and user-defined controls to configuring auditor access and choosing the right option profile. Know the steps to start a scan, understand what happens next, verify results, and stay aligned with your scan schedule. Discover additional scanning features to enhance your compliance program. |
Check out your scan resultsHow do I know when the scan is done? You know when the scan status shows Finished. At this time you can select View from the Quick Actions menu to see the full results in an HTML report. If you have notifications turned on you get an email. When can I run reports? Your scan results are merged (processed) into your account.Watch for the solid green circle |
Verify that authentication workedInformation about whether hosts passed or failed authentication appears in your scan results: look at the Report Summary and the Appendix. You can also run the Authentication Report. Learn more about authentication for scans. |
Stay in sync with your scan calendar
Access your scan calendar anywhere, anytime. Learn more about scan calendar.
Interested in more scanning capabilities?
Check out these options: Amazon EC2 Scanning | File Integrity Monitoring | Password Auditing | Windows user Rights Controls | Detailed Security Auditing for Windows | IPv6 Scanning | Scan by Hostname | Agentless Tracking
You can exclude a host from ALL scans in one step. Add the IP to the global exclude list under Scans > Setup.