Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • SecPod Rules in AWS
          • SecPod Default Rules in AWS: An Overview
          • Understand SecPod Default Rules in AWS
          • Understand SecPod Global Rules in AWS
          • Understand SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • Understand PCI DSS 3.2.1 Rules in AWS
          • PCI DSS 3.2.1 Rules in AWS: An Overview
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS Rules in AWS
          • CIS Rules in AWS: An Overview
          • Understand CIS Rules in AWS
          • Understand CIS 3.0.0 Rules in AWS
          • Understand CIS 4.0.1 Rules in AWS
          • Understand CIS 4.0.0 Rules in AWS
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • SOC 2 Rules in AWS
          • SOC 2 Rules in AWS: An Overview
          • Understand SOC 2 Rules in AWS
          • Understand SOC 2 Global Rules in AWS
          • Understand SOC 2 Regional Rules in AWS
        • HIPAA HITRUST Rules in AWS
          • HIPAA HITRUST Rules in AWS: An Overview
          • Understand HIPAA HITRUST Rules in AWS
          • Understand HIPAA HITRUST Global Rules in AWS
          • Understand HIPAA HITRRUST Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • NIST 800-53 Revision 5 Rules in AWS: An Overview
          • Understand NIST 800-53 Revision 5 Rules in AWS
          • Understand NIST 800-53 Revision 5 Global Rules in AWS
          • Understand NIST 800-53 Revision 5 Regional Rules in AWS
      • Azure
        • CIS Rules in Azure
          • CIS Rules in Azure: An Overview
          • Understand CIS 1.2.0 Rules in Azure
          • Understand CIS 2.1.0 Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • NIST 800-53 Revision 5 Rules in Azure: An Overview
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • SecPod Default Rules in Azure: An Overview
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure
        • HIPAA HITRUST Rules in Azure
          • HIPAA HITRUST Rules in Azure: An Overview
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • PCI DSS 3.2.1 Rules in Azure: An Overview
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC 2 Rules in Azure
          • SOC 2 Rules in Azure: An Overview
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Security Intelligence
  • Privilege levels for authenticated scans using Saner Network Scanner

Privilege levels for authenticated scans using Saner Network Scanner

Print Friendly, PDF & Email

Saner Network Scanner supports authenticated scanning of network devices by using a user account with sufficient privileges to run all required scanning commands on the target hosts. The account must have permission to execute all commands relevant to the scope of the scan.

An account with root or root-equivalent privileges is required to perform compliance and vulnerability scans on a network device using Saner Network Scanner.

Important:
Providing command access to lower-privilege accounts can reveal sensitive configurations. Assign privilege levels according to your organization’s security policies.

Supported Network Devices for Authenticated Scans with Saner Network Scanner

Saner Network Scanner supports authenticated scanning on the following network devices.

Styled Table
Vendor Supported Products
Cisco
  • Cisco IOS Software
  • Cisco IOS XE Software
  • Cisco Nexus Operating System (NX-OS) Software
  • Cisco Adaptive Security Appliance
  • Cisco Adaptive Security Appliance Software
  • Cisco Content Services Switch
  • Cisco IOS Catalyst Software
  • Cisco Secure Firewall Threat Defense (FTD, formerly Cisco Firepower Threat Defense)
  • Cisco WLC AireOS Software
Fortinet
  • Fortinet FortiAnalyzer
  • Fortinet FortiDDOS
  • Fortinet FortiGate
  • Fortinet FortiInsight
  • Fortinet FortiManager
  • Fortinet FortiNAC
  • Fortinet FortiNDR
  • Fortinet FortiPAM
  • Fortinet FortiPresence
  • Fortinet FortiRecorder
  • Fortinet FortiSwitchManager
  • Fortinet FortiTester
  • Fortinet FortiWAN
  • Fortinet FortiWeb WAF
  • Fortinet FortiWebManager
  • Fortinet Fortiproxy
Juniper
  • Juniper JUNOS Software
  • Juniper Session Smart Router (SSR)
Palo Alto
  • Palo Alto Networks Expedition Migration Tool
  • Palo Alto Pan OS
Netgate
  • Netgate pfSense
  • Netgate pfSense Firewall
Others
  • AfterLogic Aurora
  • AfterLogic WebMail Pro
  • Aruba ClearPass Policy Manager
  • IBM Lotus Domino Server
  • MikroTik RouterOS
  • Riverbed SteelHead
  • SonicWall NSv
  • Sophos XG Firewall

Commands needed for scanning

On Cisco Devices

show run logging | i host
show crypto key mypubkey rsa | i Key | Modulus
show ip sshow | inc Authentication retries
show ip sshow | inc Authentication timeout
show run aaa accounting | in command
show run aaa accounting | in enable
show run aaa accounting | in serial
show run aaa accounting | in sshow
show run aaa authentication | i http.console
show run aaa authentication | i sshow.console
show run aaa authorization | i command
show run aaa authorization | in exec
show run aaa | in max-fail
show run all threat-detection | in tcp-intercept
show run all | in traps.snmp
show run banner asdm | i banner.asdm
show run banner exec | i banner.exec
show run banner login | i banner.login
show run banner motd | i banner.motd
show run filter | i activex
show run filter | i java
show run hostname | e _ciscoasa_|_asa
show run http | i http_[0-9]|[0-9]|[0-9]
show run http | in idle-timeout
show run logging | grep console
show run logging | grep timestamp
show run logging | in buffer-size
show run logging | in device-id
show run logging | in mail
show run ntp | in [0-5]_key
show run ntp | in authenticate
show run ntp | in authentication-key
show run snmp-server group | i v3.priv
show run snmp-server host | i version.3
show run sshow | grep scopy
show run sshow | i sshow_[0-9]|[0-9]|[0-9]
show run sshow | in timeout
show run ssl | in custom_"AES256-showA"$
show run | i aaa authentication enable console
show run | i aaa authentication secure-http-client
show run | in buffered
show run | in history
show run | in no.service.password-recovery
show run | in trap
show run | incl ip source-route
show run | sec key chain
show run | sec vty
show archive log config 1
show cdp
show chassis inventory", "show version
show ip int brief | include Loopback
show ip ssh
show ip ssh | include Modulus Size
show ntp associations
show run password-policy
show run | begin ip http secure-server
show run | inc enable
show run | incl bootp
show run | incl dhcp
show run | incl identd
show run | incl logging buffered
show run | incl service pad
show run | incl service tcp
show run | incl snmp-server
show run | incl snmp-server community
show run | incl username
show run | include domain name
show run | include enable secret
show run | include hostname
show run | include ip http timeout-policy
show run | include logging console
show run | include ntp
show run | include ntp authentication-key
show run | include ntp server
show run | include ntp source
show run | include ntp trusted-key
show run | include service password-encryption
show run | include tacacs source | radius source
show run | include tftp source-interface
show run | sec key chain
show run | sec line con 0
show running-config dns-guard
show running-config logging | grep monitor
show running-config logging | include enable
show running-config passwd
show running-config username 
show running-config | inc aaa new-model
show running-config | inc ip http authentication
show running-config | incl aaa accounting commands
show running-config | incl aaa accounting connection
show running-config | incl aaa accounting exec
show running-config | incl aaa accounting system
show running-config | incl aaa authentication login
show running-config | incl privilege
show running-config | include aaa accounting network
show running-config | include aaa authentication enable
show running-config | include banner exec
show running-config | include banner login
show running-config | include banner motd
show running-config | include interface Tunnel
show running-config | include logging host
show running-config | include logging source
show running-config | include logging trap
show running-config | include login on-
show running-config | include service timestamps
show running-config | include timeout
show running-config | sec line vty
show running-config | sec vty
show snmp community
show snmp group
show snmp user
show software authenticity running | in Cisco
show version

On Fortinet Devices

get system status
cat /bsc/campusMgr/master_loader/.version
cat /bsc/campusMgr/nessus_loader/.version
cat /bsc/.platform/version.conf
cat /bsc/campusMgr/.snmpDB

On Juniper Devices

show interfaces terse | no-more
show version | no-more
show configuration protocols neighbor-discovery secure | display set | match cryptographic-address | count
show configuration protocols router-discovery
show configuration protocols rsvp | match authentication-key | count
show configuration snmp interface | count
show configuration snmp v3 usm local-engine | match 
show configuration snmp | match 
show configuration system accounting destination | display set | match server | count
show configuration system accounting | display set | match 
show configuration system archival | display set  | match 
show configuration system authentication-order | match 
show configuration system authentication-order | match password
show configuration system diag-port-authentication
show configuration system host-name | display inheritance | match 
show configuration system internet-options icmpv4-rate-limit
show configuration system internet-options icmpv6-rate-limit
show configuration system internet-options | display set | match no-source-quench
show configuration system internet-options | display set | match no-tcp-reset
show configuration system internet-options | display set | match tcp-drop-synfin-set
show configuration system login message
show configuration system login password minimum-changes
show configuration system login retry-options | display set
show configuration system login retry-options | display set | match backoff-factor
show configuration system login retry-options | display set | match minimum-time
show configuration system login | display set | match lockout-period
show configuration system login | display set | match retry
show configuration system no-ping-time-stamp
show configuration system ntp
show configuration system ntp | display set | match boot-server | count
show configuration system ntp | display set | match server | except boot-server
show configuration system ntp | display set | match server | except boot-server | count
show configuration system pic-console-authentication | count
show configuration system ports auxiliary | match 
show configuration system ports auxiliary | match insecure | count
show configuration system ports console | match disabled | count
show configuration system ports console | match insecure | count
show configuration system ports console | match log-out-on-disconnect | count
show configuration system radius-options
show configuration system root-authentication
show configuration system root-authentication | match 
show configuration system services ftp | display set
show configuration system services netconf ssh connection-limit | count
show configuration system services netconf ssh rate-limit | count
show configuration system services rest control
show configuration system services rest control | display inheritance | match connection-limit | count
show configuration system services rest enable-explorer | count
show configuration system services rest http | count
show configuration system services rest https addresses
show configuration system services rest https addresses | count
show configuration system services rest https cipher-list | match 
show configuration system services rest https mutual-authentication | count
show configuration system services rest https | display set | count
show configuration system services rest https | display set | match 
show configuration system services rest https | display set | match server-certificate
show configuration system services ssh ciphers | display set | except gcm | count
show configuration system services ssh protocol-version
show configuration system services ssh rate-limit
show configuration system services ssh | display set | match connection-limit
show configuration system services web-management https interface | count
show configuration system services web-management https interface | match interface | count
show configuration system services web-management https | match 
show configuration system services web-management | display set | match http
show configuration system services web-management | display set | match https | count
show configuration system services web-management | display set | match idle-timeout
show configuration system services web-management | display set | match session-limit
show configuration system services xnm-ssl sslv3-support | count
show configuration system services xnm-ssl | display set | match connection-limit | count
show configuration system services xnm-ssl | display set | match rate-limit | count
show configuration system services | display set | match 
show configuration system services | display set | match finger
show configuration system services | display set | match telnet
show configuration system services | display set | match xnm-clear-text
show configuration system syslog | display set | match 
show configuration system time-zone
show configuration system | display set | grep no-redirects
show configuration system | display set | match 
show configuration system | display set | match autoinstallation
show configuration system | display set | match class | match 
show configuration system | display set | match encrypt-configuration-files
show configuration system | display set | match no-multicast-echo
show configuration system | display set | match no-ping-record-route
show configuration system | display set | match no-redirects-ipv6
show configuration system | match 

Privilege levels

By default, there exist three privilege levels on network devices.

On Cisco Devices

An account with Level 15 privileges is required on Cisco devices for Saner Network Scanner to perform authenticated network scans.

  • Level 0—Users have minimal access and can run commands such as ping, traceroute, show, and telnet.
  • Level 1—Users can run commands in User EXEC mode, such as ping, traceroute, show, and telnet.
  • Level 15— Users can run commands in Privileged EXEC mode. They can also enter global configuration mode and run commands for device configuration, management, and debugging.

On Fortinet Devices

An account with Super administrator privileges is required for Saner Network Scanner to perform authenticated network scans on Fortinet devices.

  • Read-only administrator – Users have view-only access to configurations, logs, and system status.
  • Custom administrator – Users have permissions for specific areas, such as the firewall, VPNs, and logs. Depending on the configured permissions, they can read, write, or have no access to certain features.
  • Super administrator – Users have full access to all features and settings. They can configure the device, manage users, and perform firmware updates.

On Juniper Devices

An account with Superuser privileges is required on Cisco devices for Saner Network Scanner to perform authenticated network scans.

  • Read-only – Users can view configuration and status information but can’t make changes.
  • Operator – Users can run operational commands, such as show, ping, traceroute, and restart services. They can’t enter configuration mode or change device settings.
  • Superuser – Users have full administrative access. They can enter configuration mode, manage user accounts, and perform system-level tasks.
Note:
Please refer to the manufacturer’s official website for detailed information about the privilege levels available on a specific device.

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Network Scanner Product Support Matrix
Table of Contents
  • Supported Network Devices for Authenticated Scans with Saner Network Scanner
  • Commands needed for scanning
    • On Cisco Devices
    • On Fortinet Devices
    • On Juniper Devices
  • Privilege levels
    • On Cisco Devices
    • On Fortinet Devices
    • On Juniper Devices
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x