Available Scanning Profiles
GFI LanGuard ships with the default scanning profiles described in the sections below. To create your own custom scanning profiles, refer to Creating a new Scanning Profile. Use the information provided in the following sections to understand what each scanning profile detects on your scan targets:
Complete/Combination Scans
Complete/Combination Scans profiles | |
---|---|
Full Vulnerability Assessment | Use this scanning profile to enumerate particular network vulnerabilities such as open TCP/UDP portsAn acronym for User Datagram Protocol, these used to transfer UDP data between devices. In this protocol received packets are not acknowledged. commonly exploited by TrojansA form of malware that contains a hidden application that will harm a computer. as well as missing patches and service packs. The list of vulnerabilities enumerated by this profile can be customized through the Vulnerabilities tab. Installed USB devices and applications are not enumerated by this profile. This profile will scan for all vulnerabilities. This includes vulnerabilities which have an associated Microsoft® patch to them and which are considered missing patches. |
Full Scan (Active) | Use this scanning profile to retrieve system information as well as scan your network for all supported vulnerabilities including open TCP/UDP ports, missing patches and service packs, USB devices connected and more. The vulnerability check timeouts in this profile are specifically preconfigured to suite the network traffic and transmission delays usually associated with LAN environments. |
Full Scan (Slow Networks) | Use this scanning profile to retrieve system information as well as scan your network for all supported vulnerabilities including open TCP/UDP ports, missing patches and service packs, USB devices connected and more… The vulnerability check timeouts in this profile are specifically preconfigured to suite the network traffic and transmission delays usually associated with WAN environments. |
Vulnerability Assessment
Vulnerability Assessment profiles | |
---|---|
Top SANSAn acronym for System Administration, Networking and Security research organization. An institute that shares solutions regarding system and security alerts. 20 Vulnerabilities | Use this scanning profile to enumerate all vulnerabilities reported in the SANS top 20 list. |
High Security Vulnerabilities | Use this scanning profile to enumerate open TCP/UDP ports and high security vulnerabilities. The list of TCP/UDP ports and high security vulnerabilities that will be enumerated by this profile can be customized through the TCP/UDP Ports tabs and the Vulnerabilities tab respectively. |
Last Year's Vulnerabilities | Use this scanning profile to enumerate network vulnerabilities that emerged during the last 12 months. |
Only Web | Use this scanning profile to identify web–server specific vulnerabilities. This includes scanning and enumerating open TCP portsAcronym for Transmitting Control Protocol. This protocol is developed to allow applications to transmit and receive data over the internet using the well-known computer ports. that are most commonly used by web–servers such as port 80. Only TCP ports commonly used by web–servers are scanned by this profile. Network auditing operations as well as enumeration of vulnerabilities and missing patches are not performed using this profile. |
Missing Patches | Use this scanning profile to enumerate missing patches. The list of missing patches that will be enumerated by this profile can be customized through the Patches tab. |
Critical Patches | Use this scanning profile to enumerate only missing patches that are tagged as critical. The list of critical patches that will be enumerated by this profile can be customized through the Patches tab. |
Last Month's Patches | Use this scanning profile to enumerate only missing patches that were released last month. The list of missing patches that will be enumerated by this profile can be customized through the Patches tab. |
Only Service Packs | Use this scanning profile to enumerate missing service packs. The list of service packs that will be enumerated by this profile can be customized through the Patches tab. |
Non-Microsoft® Patches | Use this scanning profile to enumerate missing Third-Party patches, such as Adobe products. |
Security Patches | Use this scanning profile to enumerate missing Microsoft® and non-Microsoft® Security Patches on your scan targets. |
Network & Software Audit
Network & Software Audit profiles | |
---|---|
Trojan Ports | Use this scanning profile to enumerate open TCP/UDP ports that are commonly exploited by known Trojans. The list of TCP/UDP ports to be scanned can be customized through the TCP Ports and UDP Ports tabs respectively. Only the TCP/UDP ports commonly exploited by known Trojans are scanned by this profile. Network auditing operations as well as enumeration of other open TCP/UDP ports and missing patches are not performed by this profile. |
Port Scanner | Use this scanning profile to enumerate open TCP/UDP ports including those most commonly exploited by Trojans. The list of ports that will be enumerated by this profile can be customized through the TCP/UDP ports tab. |
Software Audit | Use this scanning profile to enumerate all software applications installed on scan targets. This includes security software such as antivirus and antispyware. |
Full TCP & UDP Scan | Use this scanning profile to audit your network and enumerate all open TCP and UDP ports. |
Only SNMPSimple Network Management Protocol is a protocol for network management. It is used to collect information from network devices, such as servers, printers, hubs, switches, and routers. | Use this scanning profile to perform network discovery and retrieve information regarding hardware devices (routers, switches, printers, etc.) that have SNMP enabled. This enables you to monitor network–attached devices for conditions that require administrative attention. |
Ping Them All | Use this scanning profile to audit your network and enumerate all computers that are currently connected and running. |
Share Finder | Use this scanning profile to audit your network and enumerate all open shares either hidden or visible. No vulnerability checks are performed by this profile. |
Uptimes | Use this scanning profile to audit your network and identify how long each computer has been running since the last reboot. |
Disks Space Usage | Use this scanning profile to audit your network and retrieve system information on available storage space. |
System Information | Use this scanning profile to retrieve system information such as operating system details, wireless/virtual/physical network devices connected, USB devices connected, installed applications and more. |
Hardware Audit | Use this scanning profile to audit your network and enumerate all hardware devices currently connected to your network computers. |
Network Discovery | Use this scanning profile to enumerate any IP enabled device connected to your network. |