Enterprise Recon 2.0.30

Agentless Scan

You can use ER2 to perform an agentless scan on network Targets via a Proxy Agent. Agentless scans allow you to perform a scan on a target system without having to:

  1. Install a Node Agent on the Target host, and
  2. Transmit sensitive information over the network to scan it.

Use agentless scans when:

  • The Node Agent is installed on a host other than the Target host.
  • Data transmitted over the network must be kept to a minimum.
  • The Target credential set has the required permissions to read, write and execute on the Target host.
  • The Target host security policy has been configured to allow the scanning engine to be executed locally.

For more information, see Agentless Scan Requirements below.

How an Agentless Scan Works

When an agentless scan starts, the Proxy Agent receives instructions from the Master Server to perform a scan on a Target host. Once a secure connection to the Target host has been established, the Proxy Agent copies the latest version of the scanning engine to a temporary location on the Target host.

The scanning engine is then run on the Target host. It scans the local system and sends aggregated results to the Proxy Agent, which in turn sends the results to the Master Server. Data scanned by ER2 is kept within the Target host. Only a summary of found matches is sent back to the Master Server.

Once the scan completes, the Proxy Agent cleans up temporary files created on the Target host during the scan and closes the connection.
er2-agentless-scans.png

Agentless Scan Requirements

Make sure that the Target and Proxy Agent host fulfil the following requirements:

Target Host Proxy Agent TCP Port 1 Requirements
Windows host Windows Proxy Agent

  • Port 135, 139 and 445.

For Targets running Windows Server 2008 and newer:

  • Dynamic ports 9152 - 65535

For Targets running Windows Server 2003 R2 and older:

  • Dynamic ports 1024 - 65535

WMI can be configured to use static ports instead of dynamic ports.
  • Bi-directional SCP must be allowed between the Target and Proxy Agent host.
  • The Target host security policy must be configured to allow the scanning engine to be executed locally.
  • The Target credential must have the required permissions to read, write and execute on the Target host.
Unix or Unix-like host Windows or Unix Proxy Agent
  • Port 22.
  • Target host must have a SSH server installed and running.
  • Proxy Agent host must have an SSH client installed.
  • Bi-directional SCP must be allowed between the Target and Proxy Agent host.
  • The Target host security policy must be configured to allow the scanning engine to be executed locally.
  • The Target credential must have the required permissions to read, write and execute on the Target host.

1 TCP Port allowed connections.

Start an Agentless Scan

To perform an agentless scan on a Target:

  1. In DASHBOARD, TARGETS, or SCHEDULE MANAGER, click Start Search.
  2. On the Select Locations page, click + Add Unlisted Target.
  3. In the Select Target Type window, choose Server and enter the host name of the Target in the Enter New Target Hostname field.
  4. Click Test. If ER2 can connect to the Target, the button changes to a Commit button.
  5. In the Select Types dialog box, select Target locations from Local Storage or Local Process Memory and click Next.
  6. In the Setup Targets page, assign the new Target to a Target Group, and select the operating system for the Target.
  7. The UI prompts you if there is no usable Agent detected on the Target host. Select Would you like to search this target without installing an agent on it? to continue.
  8. Fill in the following fields and click Next: er2-agentless-scans-credentials.png

    Field Description
    Credential Label Enter a descriptive label for the credential set.
    Username Enter your Target host user name.
    Password Enter your Target host user password.
    (Optional) Private Key Upload the file containing the private key.
    Only required for Target hosts that use a public key-based authentication method.
    Agent to act as proxy host Select a suitable Proxy Agent.
  9. On the Select Data Types page, select the Data Type Profiles to be included in your scan and click Next. See Data Type Profiles.
  10. Set a scan schedule in the Set Schedule section. Click Next.
  11. Review your scan configuration. Once done, click Start Scan.