- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-Threat logs
- 07-Reputation logs
- 08-URL filtering logs
- 09-File filtering logs
- 10-Data filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-NAT logs
- 15-SSL VPN user access logs
- 16-SSL VPN access resource logs
- 17-Terminal status
- 18-DLP logs
- 19-Zero trust policy logs
- 20-Application audit logs
- 21-System logs
- 22-Configuration logs
- 23-Traffic logs
- 24-Load balancing logs
- 25-TopN traffic
- 26-Security policy hit analysis
- 27-TopN threats
- 28-TopN URL filtering statistics
- 29-TopN file filtering statistics
- 30-Attack defense statistics
- 31-Server load balancing statistics
- 32-Outbound link load balancing statistics
- 33-Transparent DNS proxy statistics
- 34-Connection rate ranking
- 35-DLP statistics
- 36-TopN traffic trends
- 37-Security policy hit trend analysis
- 38-TopN threat trends
- 39-TopN URL filtering trends
- 40-TopN file filtering trends
- 41-Link trend
- 42-Routing policy trends
- 43-Virtual server trend
- 44-Server farm trends
- 45-Real server trend
- 46-Domain Requested Times Trend
- 47-TopN file filtering trends
- 48-Online SSL VPN users trend
- 49-Botnet analysis
- 50-Asset security
- 51-Threat case management
- 52-Report settings
- 53-Session list
- 54-LB session information
- 55-DNS cache information
- 56-User information center
- 57-IPv4 online users
- 58-IPv6 online users
- 59-MAC authentication online users
- 60-Terminal status
- 61-Asset scan
- 62-Ping
- 63-Tracert
- 64-Packet capture
- 65-Webpage Diagnosis
- 66-Diagnostic Info
- 67-Packet trace
- 68-Load balancing test
- 69-IPsec diagnosis
- 70-Risk analysis
- 71-Content moderation logs
- 72-Content security top
- Related Documents
-
Title | Size | Download |
---|---|---|
61-Asset scan | 30.19 KB |
Asset scan
This help contains the following topics:
Introduction
Asset scan scans the assets with the specified IP addresses or in the specified IP address ranges to obtain the operating system, MAC address, vendor information of the assets and detect security risks such as open ports and weak passwords. The administrator can then perform system hardening based on the information to eliminating possible potential attacks.
Asset scan supports scanning the specified IPv4 addresses, IPv6 addresses, TCP ports, and UDP ports.
The following table shows security risk types and the recommended protection measures:
Table 1 Risk types and protection measures
Risk type |
Protection measure |
Open port |
Use a security policy to deny packets that access the open ports. |
Weak password |
Modify the weak passwords of users. |
Restrictions and guidelines
· The start address in each IPv4 address range cannot be higher than the end address. Otherwise, asset scanning cannot work correctly.
· Do not modify the security policy during the asset scanning process. Otherwise, the scanning result might not be correct.
· If you specify neither the TCP ports nor the UDP ports, the device will scan the following ports:
¡ TCP ports: 23, 80, 139, 443, 445, 554, 631, 3389, 3872, 5800, 7080, 8000, 8080, 8088, 8180, and 8443.
¡ UDP port: 137.
Configure asset scan
1. Click the Monitor tab.
2. In the navigation pane, select Asset Management > Asset Scan.
3. In the Address range box, specify individual IPv4 or IPv6 addresses, IPv4 or IPv6 address ranges, or IPv4 or IPv6 subnets.
4. Select or enter the TCP ports.
5. Select or enter the UDP ports.
6. To enable automatic scanning, select Auto scanning. The device will scan assets at regular intervals. By default, the scanning interval is 12 hours. The following types of intervals are available:
¡ Week—Scans assets every week on the specified day and time.
¡ Day—Scans assets every day at the specified time.
¡ Hour—Scans assets every specified hours.
7. To enable weak password scanning, select Enable weak password scanning. Then, click Configure to configure the weak password scanning range and scanning mode.
8. To immediately start scanning assets, click Scan. After the scanning is completed, you can click Refresh in the Scanning results area to view the asset scanning results.