Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • FAQs
    • Saner CVEM Technical FAQs
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • SecPod Rules in AWS
          • SecPod Default Rules in AWS: An Overview
          • Understand SecPod Default Rules in AWS
          • Understand SecPod Global Rules in AWS
          • Understand SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • Understand PCI DSS 3.2.1 Rules in AWS
          • PCI DSS 3.2.1 Rules in AWS: An Overview
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS Rules in AWS
          • CIS Rules in AWS: An Overview
          • Understand CIS Rules in AWS
          • Understand CIS 3.0.0 Rules in AWS
          • Understand CIS 4.0.1 Rules in AWS
          • Understand CIS 4.0.0 Rules in AWS
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • NIST 800-53 Revision 5 Rules in AWS: An Overview
          • Understand NIST 800-53 Revision 5 Rules in AWS
          • Understand NIST 800-53 Revision 5 Global Rules in AWS
          • Understand NIST 800-53 Revision 5 Regional Rules in AWS
        • SOC 2 Rules in AWS
          • SOC 2 Rules in AWS: An Overview
          • Understand SOC 2 Rules in AWS
          • Understand SOC 2 Global Rules in AWS
          • Understand SOC 2 Regional Rules in AWS
        • HIPAA HITRUST Rules in AWS
          • HIPAA HITRUST Rules in AWS: An Overview
          • Understand HIPAA HITRUST Rules in AWS
          • Understand HIPAA HITRUST Global Rules in AWS
          • Understand HIPAA HITRRUST Regional Rules in AWS
      • Azure
        • HIPAA HITRUST Rules in Azure
          • HIPAA HITRUST Rules in Azure: An Overview
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • PCI DSS 3.2.1 Rules in Azure: An Overview
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC 2 Rules in Azure
          • SOC 2 Rules in Azure: An Overview
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure
        • CIS Rules in Azure
          • CIS Rules in Azure: An Overview
          • Understand CIS 1.2.0 Rules in Azure
          • Understand CIS 2.1.0 Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • NIST 800-53 Revision 5 Rules in Azure: An Overview
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • SecPod Default Rules in Azure: An Overview
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure

Saner CVEM

  • Saner CVEM Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner CVEM
  • Saner CVEM Products
  • Saner CVEM Continuous Posture Anomaly Management User Guide

Saner CVEM Continuous Posture Anomaly Management User Guide

Print Friendly, PDF & Email

Product Overview

SanerNow Continuous Posture Anomaly Management Tool (CPAM) is a cloud-based (SaaS) tool that provides you visibility into your IT infrastructure like never seen before.

SanerNow CPAM eases IT security teams tasks of identifying devices that are misconfigured, have a unique posture, and are configured completely differently when compared to other devices.

SanerNow CPAM collectively monitors thousands of device parameters and discovers all the Posture Anomalies that persist in your IT environment. This includes – Outliers, aberrations, and deviations that are present in your IT infrastructure.

Getting Started with SanerNow CPAM

If you’re an existing customer who have subscribed to the Endpoint Query and Response tool (EQR), CPAM tool will be available to you under the SanerNow tools icon. You can click on the PA icon, and it will take you to the PA dashboard.

PA Dashboard

Note: CPAM tool has replaced EQR. You will find it listed as PA throughout SanerNow’s interface.

Select the Account you want to work with.

Click the SanerNow tools icon and select PA (Posture Anomaly) from the list of SanerNow tools.

Posture Anomaly bar

Performing Posture Anomaly Scan on an account for the first time

You will likely encounter a blank dashboard if PA Scan has not been performed on the account. Your screen will look exactly like the image mentioned below.

The PA tool needs data to do the computation and reveal the anomalies that exist in your account. And for this data to be collected, PA tool needs to execute a scan on the account.

How to launch a Posture Anomaly Scan on an account?

Follow the steps below to launch a PA Scan on an account.

Step 1: Select the account on which you want the PA Scan to be performed. You can find the account on the top-left corner of the page.

PA Scanner Page

Step 2: If you want PA Scan to be performed immediately on the account, click on ‘Scan Now’. This will initiate a PA Scan. The scan time will vary depending on the number of devices available within the account.

However, if you don’t want to perform an immediate PA Scan on the account, you can schedule one for later. The following options are available for scheduling a PA Scan.

  1. Daily
  2. Weekly
  3. Monthly

How to schedule a Posture Anomaly Scan to run daily?

Follow the steps below to run a daily PA Scan on the account.

Step 1: Select the schedule as Daily.

Step 2: You need to specify the Start time – this is the time when the PA Scan will be run on the account.

Step 3: Click on Update to save the PA Scan preferences.

How to schedule a Posture Anomaly Scan to run on a weekly basis?

Follow the steps below to run a PA Scan on a weekly basis.

Step 1: Select the Schedule as Weekly.

Step 2: Specify how many weeks you want the PA Scan to be performed on the account.

Step 3: Once you have selected the weeks, select all the days for which you want the PA Scan to be done on the account.

Step 4: Select the Start time – the PA Scan will be launched at this time every week as per the schedule you set.

Step 5: Click on Update to save weekly PA Scan preferences.

How to schedule a Posture Anomaly Scan to run on a monthly basis?

Follow the steps below to run a PA Scan on a monthly basis.

Step 1:  Select the Schedule as Monthly.

Step 2: Select the months on which you want the PA Scan to be performed.

Step 3:  Specify the weeks on which PA Scan needs to be done.

Step 4: Select the days when the PA Scan is required on the account.

Step 5: Select the Start time – the PA Scan will be launched at this time every month as per the schedule you set.

Step 6: Click on Update to save monthly PA Scan preferences.

How to delete Posture Anomaly Scanner scan preferences?

Click on the Delete button on the PA Scanner page. This will delete all saved scan preferences. However, the data from previous PA Scans will be retained.

What time zone is used by Posture Anomaly Scanner to run scheduled scans?

 All scheduled PA Scans will be launched in accordance with time zone configuration on the SanerNow Server.

Getting familiarized with PA Dashboard

Once the PA Scan is done on the account, the PA tool will do the computation on the collected data and populate the relevant sections of the dashboard.

PA Dashboard

Let’s look at each of the components available on the PA Dashboard and their functionalities.

Posture Anomaly Distribution Graph

The total number of anomalies discovered in the account is displayed at the top right corner of the Posture Anomaly Distribution Graph.

Additionally, the anomalies discovered are categorized as high, low, and medium and presented in a pie chart form. The categorization is done on how far the discovered anomalies deviate from the baseline.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly Density Graph

The Posture Anomaly Density Graph shows the count of devices detected for individual PA ID’s.

You can click on any of these individual bubbles to get more information. Details such as PA ID, the description of the PA ID, applicable family and the total number of hosts will be displayed on this page.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly Radar

The Posture Anomaly Radar shows the distribution of anomalies depending on the category they fall under.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly Details

The Posture Anomaly Details pane gives you a detailed view of all the anomalies detected in the account.

The following information is presented in a tabular format on the Posture Anomaly Details pane.

  1. ID: This column displays all the PA ID relevant to the anomalies detected in the environment.
  2. Title: This column displays the title of the PA ID.
  3. Summary: This column gives a summary of the Posture Anomaly found in the account. Information such as – the OS family with the highest number of anomalies found is displayed here.
  4. Anomalies: This column lists the total count of anomalies relevant to a particular PA ID.
  5. Hosts: This column provides the total number of hosts affected by the anomalies that fall under the purview of a particular PA ID.
  6. Confidence Level: The confidence level is calculated on the basis of how far the detected anomaly deviates from the baseline. The confidence level is further classified into high, low, and medium.
  7. Category: This column shows the category the detected PA ID belongs to. Refer to the Types of Category section to know more.
  8. Detected Date: This column shows the date on which the PA tool detected the anomaly.
  9. Fix: This column provides the fix for the applicable PA ID.

You can search for specific PA ID’s by using the search option located on the top right side of the Posture Anomaly Details pane.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly Device Details

The Posture Anomaly Details pane gives you a detailed view of all the anomalies that were discovered on individuals hosts in the account.

The Posture Anomaly Device Details pane gives below mentioned information:

  1. Host Name: This column shows the hostname associated with the device on which anomalies exist.
  2. IP Address: This column shows the IP address associated with the device on which the anomalies exist.
  3. Operating System: This column shows the Operating System running on the device on which the anomalies exist.
  4. Group: This column shows the group of Operating System the device belongs to on which the anomalies exist.
  5. Family: This column shows the family of Operating System the device belongs to on which the anomalies exist.
  6. Anomaly: This column shows the total count of anomalies that exist on the device.
  7. Posture Category: This column shows the categories of anomalies that exist on the device.

Status: This column shows the Device Status. The Status can be – Offline and Online. If the Status icon is red – this means that the device is offline. And if the Status icon is green – this means that the device is Online.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Types of Posture Category

The Posture Anomaly is divided into below categories:

  1. Network
  2. System
  3. Service
  4. Process
  5. System Security
  6. Software Assets
  7. User
  8. Events
  9. Risk
  10. Devices

Posture Anomaly by Group

The Posture Anomaly by Group pane gives you a pie chart representation of the devices categorized by the Operating Systems running on them.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly by Family

The Posture Anomaly by Family pane gives you a pie chart representation of the devices categorized by the OS families they belong to.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

Posture Anomaly on Devices

The Posture Anomaly on Devices pane gives you a pie chart representation of the devices categorized by Suspicious Devices and Non-Suspicious Devices.

You can download the information displayed on this pane in the form of a .csv file by clicking on the icon located at the top right corner of the pane.

How to Fix Anomalies detected in your account?

There are various ways you can fix anomalies detected in your account using PA tool.

Fixing Anomalies from PA Dashboard

Click on the wrench icon displayed under the ‘Fix’ column to start fixing anomalies that fall under a particular PA ID.

You will be presented with a screen that will show possible actions that can be taken to fix the anomaly. These actions will vary depending on the kind of anomaly detected and the operating system running on the devices.

The Detected Anomalies Action screen will show you all available possible actions for operating systems on which anomalies were detected. The number of possible actions available to fix the anomaly on individual operating systems is displayed right next to the operating system label.

Once you click on any of the Possible Actions buttons, you will be directed to the Response and Deploy page.

Here, you can see the kind of action being performed on the top left page. Under the Action Box, you can see the details of the actions. This information displayed in the Action Box will change depending on the type of action being performed as part of the remediation of the anomaly. And under the Deploy page, you can see all the devices on which the Action will be performed.

Fixing Anomalies from Posture Anomaly Summary Page

Another way of fixing an anomaly is by clicking on the PA ID displayed under the ID column of the Posture Anomaly Details on the PA Dashboard. This will take you to the PA Summary page. Here, you will get detailed information related to the PA ID.

You can click on the wrench button on the top right corner of the page to start the remediation for all the anomalies that fall under the PA ID.

Once you click on the wrench button, you will be directed to the Detected Anomalies Action.

Once you click on any of the Possible Actions buttons, you will be directed to the Response and Deploy page.

Here, you can see the kind of action being performed on the top left page. Under the Action Box, you can see the details of the actions. This information displayed in the Action Box will change depending on the type of action being performed as part of the remediation of the anomaly. And under the Deploy page, you can see all the devices on which the Action will be performed.

Fixing Anomalies from All Anomalies Page

    Click on All Anomalies label on the PA Dashboard page.

You will be re-directed to All Anomalies page. This page has two sections.

  1. Anomalous
  2. Normalized

Anomalous section – This section shows all the anomalies detected in the account. Each red tile displays the total number of devices that were discovered under a particular anomaly. PA-ID details and a summary is shown on the tile. You can hover over the tile to get more information about the PA ID.

Normalized Section: This section shows all the anomalies that were normalized. Each green tile displayed the total number of devices that were remediated that belong to a particular PA ID. PA-ID details and a brief summary are shown on the tile. You can hover over the tile to get more information about the PA ID.

You can click on the red tile. This will take you to the PA Summary page. You can click on the wrench button on the top right corner of the page to start the remediation for all the anomalies that fall under the PA ID.

Once you click on the wrench button, you will be directed to the Detected Anomalies Action.

Once you click on any of the Possible Actions buttons, you will be directed to the Response and Deploy page

Here, you can see the kind of action being performed on the top left page. Under the Action Box, you can see the details of the actions. This information displayed in the Action Box will change depending on the type of action being performed as part of the remediation of the anomaly. And under the Deploy page, you can see all the devices on which the Action will be performed.

How to configure Posture Anomaly tool for custom detection?

Click on Configure label on the PA Dashboard. This will take you to the Configure page.

On this page, you can perform checks to detect unwanted services, ports, processes, start-up applications, devices, and environment variables.

PA Tool provides a total of 6 configurable PA ID’s that can be used for custom detection.

  1. PA 2022-1068 – Unwanted Ports
  2. PA 2022 -1069 – Unwanted Services
  3. PA 2022- 1070 – Unwanted Processes
  4. PA 2022 1071 – Unwanted Startup Applications
  5. PA 2022-1072 – Unwanted Devices
  6. PA 2022-1073 – Unwanted Environment variables

Each of these PA IDs allow you to provide inputs that are OS specific – Windows, Linux, MacOS. Also, you can provide inputs for Network Devices under ‘Others’ tab. Once you provide values for any of these configurable PA ID’s, the PA tool will initiate a scan and the values provided by you will be whitelisted within the account.

Note: Users need to mandatorily configure each of these six configurable PA ID’s. This means that the user needs to explicitly tell which ports, services, processes, startup applications, devices, and environment variables are allowed within the account.

How to whitelist an entire PA ID?

Click on the Whitelist option on the PA Dashboard.

You will be redirected to the Whitelist page.

On this page, you can select the PA ID’s that you want to be whitelisted within the account. You can select single, multiple or even select all listed PA ID’s here by clicking on the checkbox located on the left side right next to the ID column. And then click on the Save button located at the right-hand corner of the page. Once you do this, the PA tool will whitelist the selected the PA ID’s and then perform a Posture Anomaly Scan on the account to recalculate the Anomaly status.

Now go to the PA Dashboard, you will see all the non-whitelisted PA IDs displayed under Posture Anomaly Details pane. You can see a ‘Eye’ icon on the Posture Anomaly Details pane. This indicates that whitelisted PA IDs exist and are not displayed currently.

You can click on the Eye icon to see whitelisted PA ID’s.

How to build your own Detection and Response?

Click on Custom Rules on the PA Dashboard to build your custom detection and response.

This will take you to the page where you can build your own Detection and Response.


PA tool helps you write custom detection scripts and response scripts to respond to threats through its query module.

A query is a request for information from a database or live data from endpoints where the SanerNow agent is installed. SanerNow supports natural language-based queries related to the endpoint’s processes, services, users, registry, network, and device configurations. The SanerNow platform’s metadata model makes it easy to search using unstructured natural language-based queries. SanerNow is fully compliant with well-established standards, such as SCAP and STIX/TAXII.

Query results are fetched in microseconds to help make quick decisions around endpoint activities. Complex queries can be created, or multiple queries can be cascaded with ‘AND’ and ‘OR’ combinations.

Queries are categorized into two types:

1. Default Queries – The SanerNow solution provides default queries that can fetch information such as anti-virus information, hosts that have disabled the firewall, hosts that have disabled Bit locker protection, etc.

2. Custom Queries – Users can create custom queries.

To create a custom query, click the Detection or Response button. A query contains two options:

Add Rule – to select supported probes. Multiple rules can be selected with AND or OR operations.

Add Group – to join rules based on conditions. Multiple rules can be joined into one group.

The Run option displays the query results fetched from the database. The Edit and Delete buttons allow you to edit or delete the queries.

To create a custom query for threat detection.

  1. Click Detection in the Build your own Detection and Response pane. The query building page is displayed with a drag and drop library of probes.
  2. Filter the probes according to the operating system for which you want to write a query.

For example, to check for Locky using multiple rules, drag and drop Registry Key Effective Rights probes into the Action Box pane, as shown below. Drag and drop Hive and Key as the parameters. Add a file and the file path.

Select the devices and groups you want to query. Click the Deploy option at the top right corner. Select the devices and groups you want to query. Click the Deploy button at the top right corner. Once you do that, ‘DeployPackage’ window appears. Here, you can specify the package name, the number of times you want the query to run, and the intervals at which the query should be executed.

You need to specify when the query should be run – immediately, daily, weekly, monthly, or on a specific date. Specify the time and the corresponding days of the week, month, or date. And then assign the query a severity – low, medium, high, or critical. And then click on the Create button.

Once the query is created or updated, the results are displayed in real-time. After the task is created, SanerNow searches the system reports’ local database. Click on Submit to retrieve the report. Clicking Submit sends the queries to the Saner Agent to fetch the current data.

Detection Summary

This page shows a list of queries, affected hosts, and the associated risk severity.

The number displayed under Hosts column shows the total count of devices affected. Click on the number to view the hostname of the affected device and other details such as the device’s hardware and software details and the vulnerability, compliance, patch, and endpoint details on a new page.

Go to the Endpoint Threat Detection tab to view all the EQR details related to the host.

Click the Query name to delve into further details such as the system details and the probe details such as the file path, file name, hive, program name, etc. Click the back arrow to return to the details page.

Click the Submit to submit the query to the Saner agents.

Click the Edit to modify the query you want to submit to the agents. Click the Expand icon to modify the query, run it, or delete the scheduled detection job.

Click on the Create New Detection option to create a custom query for threat detection. Refer to the Build your own Detection and Response section for more details.

Response Summary

This page shows a list of all the response scripts written to prevent, stop, or clean up malware. It will display the response name, type, date and time on which the scripts ran, and the status.

How to create a new response

Click on the Create New Response option. The response building page is displayed with a network interface index, unique ID, IP address, and MAC address fields.

Select the devices and groups. Click on the Deploy option at the top right corner. And then you will see the Deploy Package dialog box on the screen.

Specify a response name and the response description. Specify when you want to run the response – immediately, daily, weekly, monthly, or on a specific date. Specify the time, the corresponding days of the week, and the days of the month. Or date. And then click on the Create button.

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Saner CVEM Asset Exposure User GuideData Points IT teams can Fetch from Saner CPAM
Table of Contents
  • Product Overview
  • Getting Started with SanerNow CPAM
  • How to launch a Posture Anomaly Scan on an account?
  • How to schedule a Posture Anomaly Scan to run daily?
  • How to schedule a Posture Anomaly Scan to run on a weekly basis?
  • How to schedule a Posture Anomaly Scan to run on a monthly basis?
  • How to delete Posture Anomaly Scanner scan preferences?
  • Getting familiarized with PA Dashboard
  • Posture Anomaly Distribution Graph
  • Posture Anomaly Density Graph
  • Posture Anomaly Radar
  • Posture Anomaly Details
  • Posture Anomaly Device Details
  • Types of Posture Category
  • Posture Anomaly by Group
  • Posture Anomaly by Family
  • Posture Anomaly on Devices
  • How to Fix Anomalies detected in your account?
    • Fixing Anomalies from PA Dashboard
    • Fixing Anomalies from Posture Anomaly Summary Page
    • Fixing Anomalies from All Anomalies Page
  • How to configure Posture Anomaly tool for custom detection?
  • How to whitelist an entire PA ID?
  • How to build your own Detection and Response?
  • Detection Summary
  • Response Summary
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x