Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • Onboarding a GCP Organization to Saner Cloud(CLI)
      • Onboarding a GCP Project to Saner Cloud (CLI)
      • Onboarding a GCP Organization to Saner Cloud(Manual)
      • Onboarding a GCP Project to Saner Cloud(Manual)
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Secure Your IAM entities with Cloud Infrastructure Entitlement Management (CIEM)
    • Critical Events to Monitor in GCP
    • Saner CSRP Classification Based on Scoring Decision
    • Cloud Cyber Hygiene Scoring(CCHS) Approach
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide
    • Azure Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Risk Prioritization(CSRP) User guide
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CCHS
      • How to Monitor Resource Risk Trends for CHS?
      • How to Assess Resource Health through Severity Distribution?
      • How to Evaluate Service-Level Risks Using CHS Scores?
      • How to Analyze Cyber Hygiene Scores through Trend Chart?
      • How to Identify High-Risk Resources by Geo Location?
      • How to Get an Overview of Cyber Hygiene for Cloud Resources?
      • How to Review Organization-Level Cyber Hygiene Across Accounts?
      • How to Assess Risk Distribution for Different Cloud Providers?
      • How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
      • How to Analyze Module-wise Risk through CHS Distribution?
      • How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
      • How to Track Security Posture with Cyber Hygiene Score?
      • How to Configure Account Weightage?
    • CSRP
      • How to Monitor and Analyze Audit Logs for Risk Prioritization?
      • How to Configure Risk Based Cloud Security Alerts?
      • How to Generate Reports and Visualizations?
      • How to Filter Risks by Tags for Targeted Analysis?
      • How to Manage Prioritized Risks at Account-level?
      • How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
      • How to Review and Prioritize Resources Based on Associated Risks?
      • How to Assess Risk Distribution on Essential Resources?
      • How to Assess and Prioritize Risks Across Resource Categories?
      • How to Identify the Risks Affecting Essential Resources?
      • How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
      • How to Review the Risk Factor Distribution Based on Automatable Reliability?
      • How to Get an Overview of Exploitable Risks?
      • How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
      • How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.3.0.1.0 Release Notes
    • Saner Cloud – V.3.0.0.0 Release Notes
    • Saner Cloud – V.2.0.0.2 Release Notes
    • Saner Cloud – V.2.0.0.1 Release Notes
    • Saner Cloud – V.2.0.0.0 Release Notes
    • Saner Cloud – V.1.2.0.1 Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner CVEM 6.6
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
    • Saner CVEM
      • Release Notes Saner CVEM 6.6
  • Saner CVEM Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence for Saner CVEM

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner

Security Intelligence for Saner Cloud

  • Benchmark Compliance Rules in AWS, Azure, and GCP
    • GCP
      • SecPod Rules in GCP
        • SecPod Default Rules in GCP: An Overview
        • Understand SecPod Default Rules in GCP
        • Understand SecPod Global Rules in GCP
        • Understand SecPod Regional Rules in GCP
      • CIS Rules in GCP
        • CIS Benchmark Compliance Rules in GCP: An Overview
        • Understand CIS 4.0.0 Rules in GCP
        • Understand CIS 4.0.0 Global Rules in GCP
        • Understand CIS 4.0.0 Regional Rules in GCP
    • AWS
      • SecPod Rules in AWS
        • SecPod Default Rules in AWS: An Overview
        • Understand SecPod Default Rules in AWS
        • Understand SecPod Global Rules in AWS
        • Understand SecPod Regional Rules in AWS
      • PCI DSS 3.2.1 Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS: An Overview
        • Understand PCI DSS 3.2.1 Rules in AWS
        • Understand PCI DSS 3.2.1 Global Rules in AWS
        • Understand PCI DSS 3.2. 1 Regional in AWS
      • CIS Rules in AWS
        • CIS Rules in AWS: An Overview
        • Understand CIS Rules in AWS
        • Understand CIS 3.0.0 Rules in AWS
        • Understand CIS 4.0.1 Rules in AWS
        • Understand CIS 4.0.0 Rules in AWS
        • Understand CIS 3.0.0 Global Rules in AWS
        • Understand CIS 4.0.0 Global Rules in AWS
        • Understand CIS 3.0.0 Regional Rules in AWS
        • Understand CIS 4.0.0 Regional Rules in AWS
      • SOC 2 Rules in AWS
        • SOC 2 Rules in AWS: An Overview
        • Understand SOC 2 Rules in AWS
        • Understand SOC 2 Global Rules in AWS
        • Understand SOC 2 Regional Rules in AWS
      • HIPAA HITRUST Rules in AWS
        • HIPAA HITRUST Rules in AWS: An Overview
        • Understand HIPAA HITRUST Rules in AWS
        • Understand HIPAA HITRUST Global Rules in AWS
        • Understand HIPAA HITRRUST Regional Rules in AWS
      • NIST 800-53 Revision 5 Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS: An Overview
        • Understand NIST 800-53 Revision 5 Rules in AWS
        • Understand NIST 800-53 Revision 5 Global Rules in AWS
        • Understand NIST 800-53 Revision 5 Regional Rules in AWS
    • Azure
      • CIS Rules in Azure
        • CIS Rules in Azure: An Overview
        • Understand CIS 1.2.0 Rules in Azure
        • Understand CIS 2.1.0 Rules in Azure
        • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
        • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
      • NIST 800-53 Revision Rules in Azure
        • NIST 800-53 Revision 5 Rules in Azure: An Overview
        • Understand NIST 800-53 Revision 5 Rules in Azure
        • Understand NIST 800-53 Revision 5 Global Rules in Azure
        • Understand NIST 800-53 Revision 5 Regional Rules in Azure
      • SecPod Rules in Azure
        • SecPod Default Rules in Azure: An Overview
        • Understand SecPod Global Rules in Azure
        • Understand SecPod Regional Rules in Azure
        • Understand SecPod Default Rules in Azure
      • HIPAA HITRUST Rules in Azure
        • HIPAA HITRUST Rules in Azure: An Overview
        • Understand HIPAA HITRUST 14.7.0 Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
      • PCI DSS Rules in Azure
        • PCI DSS 3.2.1 Rules in Azure: An Overview
        • Understand PCI DSS 4.0 Rules in Azure
        • Understand PCI DSS 4.0 Global Rules in Azure
        • Understand PCI DSS 4.0 Regional Rules in Azure
      • SOC 2 Rules in Azure
        • SOC 2 Rules in Azure: An Overview
        • Understand SOC2 Rules in Azure
        • Understand SOC2 Global Rules in Azure
        • Understand SOC2 Regional Rules in Azure
  • Posture Anomaly Checks in AWS and Azure
    • Implementing Posture Anomaly Checks in AWS
    • Implementing Posture Anomaly Checks in Azure
  • Infrastructure Entitlement Checks in AWS, Azure, and GCP
    • Implementing Infrastructure Entitlement Checks in AWS
    • Implementing Infrastructure Entitlement Checks in Azure
    • Implementing Infrastructure Entitlement Checks in GCP
View Categories
  • Home
  • Docs
  • Saner CVEM
  • Saner CVEM Products
  • Saner CVEM Network Scanner User Guide

Saner CVEM Network Scanner User Guide

Print Friendly, PDF & Email

The Saner Network Scanner helps you identify vulnerabilities and misconfigurations across all IP-enabled devices in your environment without requiring additional hardware. It uses existing endpoints within your network as distributed scanners to perform agentless assessments.

The scanner features enables you to specify what to scan (including vulnerabilities, misconfigurations, services, and exposures), how to scan (covering ports, protocol depth, and authentication methods), and when to scan (either on-demand or through scheduled tasks). It supports both unauthenticated and authenticated scanning, allowing for lightweight discovery as well as more in-depth inspections using protocol-based credentials like SSH, SMB, and HTTP/HTTPS.

Scan execution is managed through designated network scanners that can be reused for multiple tasks. These scanners can also be configured as Global Scanners, enabling sharing across various accounts or organizations. This ensures consistent coverage, even in environments without dedicated scanning infrastructure.

Results are collected, normalized, and analysed to provide actionable insights into vulnerabilities, misconfigurations, assets, and your overall security posture.

Key Concepts

Understanding the following core components helps you effectively configure and manage network scanning.

Network Scanner

A network scanner is a designated endpoint that performs scanning operations across your network.

  • Scanners execute scan tasks against defined targets (IP addresses or ranges)
  • Any eligible device in your environment can be designated as a scanner
  • Scanners can be reused across multiple scan tasks

Global Scanner

A Global Scanner is a network scanner that can be shared across multiple accounts or an entire organization.

  • Enables centralized scanner usage across environments
  • Useful when certain accounts or sites do not have dedicated scanners
  • Helps ensure consistent scan coverage without duplicating setup

Scan Policy

A scan policy defines what to scan and how the scan is performed.

  • Controls vulnerability detection, misconfiguration checks, and discovery
  • Defines scan parameters such as ports, protocols, depth, and authentication
  • Can be reused across multiple scan tasks

Saner provides:

  • Default policies for common use cases
  • Custom policies for environment-specific requirements

Scan Credentials

Scan credentials are used to perform authenticated scans for deeper visibility.

  • Enable access to systems for accurate detection of vulnerabilities and configurations
  • Managed centrally and reused across tasks

Supported credential types include:

  • SSH (Linux/Unix systems)
  • SMB (Windows systems)
  • HTTP/HTTPS

Scan Task

A scan task is a configured job that defines what to scan, how to scan, and when to scan.

Each task includes:

  • Target devices (IP addresses or ranges)
  • Scan policy
  • Assigned scanners
  • Optional credentials
  • Execution schedule

Multi-Scanner Execution

Network Scanner supports assigning multiple scanners to a single scan task.

  • Workload is distributed automatically across scanners
  • Improves scan performance and reduces execution time
  • Enables efficient scanning of large environments

Prerequisites

Ensure the following requirements are met before using Network Scanner.

Service provision
To access Network Scanner, at least one of the following services must be provisioned for your account:

  • Vulnerability Management
  • Compliance Management
  • Asset Exposure

Supported platforms for scanners:

  • Windows (64-bit)
  • Linux (64-bit)
  • macOS (Intel-based)

Not supported as scanners:

  • Windows (32-bit)
  • Linux (32-bit and ARM-based distributions)
  • Alpine Linux
  • macOS (ARM-based)
  • AIX

Additional requirements:

  • Device must be online and reachable
  • Must have network access to target IP ranges

Get Familiar with the Interface Layout

The Network Scanner page is structured with the following key menus to streamline the configuration and management of scanning operations:

Home

Provides an overview of scan tasks, scanner status, and recent activity, along with quick actions.

Scanners

Add and manage network scanners, designate devices as global scanners for use across multiple organizations, sites, or accounts.

Scan Credentials

Manage authentication credentials (SSH, SMB, HTTP/HTTPS) used for authenticated scanning.

Scan Policy

Create and manage scan policies that define what to scan and how scans get executed.

Logs

View detailed records of scan activities for auditing and troubleshooting.

Create New Task

Start a new scan task using a guided multi-step process.

Scan Tasks Overview on the Homepage

All the configured scan tasks are displayed in a table, where you can run a scan to start it immediately, download available scan results, use the More Options (…) menu to edit or delete a task, and view the progress bar to track the status of scan execution.

Set Up Scanners

Network scanners are designated devices that execute scan tasks across your network.

(Optional) Use Recommended Devices

You can filter and select devices recommended by Saner for better scan performance.

The  Show only recommended devices is enabled by default. This allow Saner’s recommendation engine to display the suggested devices that you can designate as Network Scanners.

Select a Device and Click Designate

Step1: In the Devices Available section, select one or more devices that you want to designate as a network scanner by clicking the checkbox.

Step2: Click Designate under the Action column. The selected device moves to the Designated Scanners section displaying a success message.

Configure Global Scanners

You can designate scanners as Global Scanners to make them available across multiple accounts or an entire organization.

To configure a Global Scanner:

  1. Go to Network Scanner → Scanners
  2. In the Designated Scanners section, click the Edit Configuration icon
  • Enable Global Scanner by selecting:
    • A specific account or
    • An entire organization

Once configured:

  • The scanner becomes available across selected scopes
  • Accounts without dedicated scanners can reuse these scanners

Key Considerations

  • Ensure scanners are online and reachable
  • Verify scanners have network access to target devices
  • Use Global Scanners to centralize scanning across environments

Configure Scan Credentials

Scan credentials enable authenticated scanning, allowing deeper visibility into systems and more accurate detection of vulnerabilities and misconfigurations.

When to Use Credentials?

Use credentials when:

  • You need deeper inspection beyond network-level scanning
  • Scan policies include authenticated checks
  • Target systems require authentication for access

Supported Credential Types

  • SSH – for Linux/Unix systems
  • SMB – for Windows systems
  • HTTP/HTTPS – for web-based authentication

Note: Authenticated scans provide more accurate detection of vulnerabilities and misconfigurations.

Add a Scan Credential

  1. Navigate to Network Scanner → Scan Credentials
  2. Click Add New Credential
  • Provide the following details:
  • Credential Name
  • Credential Type (SSH / SMB / HTTP/HTTPS)
  • Authentication details based on type:
    • Username and password
    • Private key and passphrase (for SSH, if applicable)
  • Click Save Credential

The credential is now available for use in scan tasks.

Manage Credentials

From the Scan Credentials page, you can:

  • Search for existing credentials
  • Edit credential details
  • Delete credentials that are no longer required

Key Considerations

  • Credentials are required only if the selected scan policy includes authenticated checks
  • Ensure credentials have sufficient permissions for accurate scan results
  • Use authenticated scanning to improve detection accuracy

Define and Manage Scan Policies

Scan policies define what to scan. They act as reusable templates for configuring network scan tasks.

Use Default or Create Custom Policy

Use Default Policies

Saner provides built-in Default Policies for common scanning scenarios.

  • Ready to use out of the box
  • Can be customized by enabling or disabling checks

    Create a Custom Scan Policy

    When should you create a custom policy?

    Create a custom policy whenever you need to modify or tailor the scripts within specific family categories to meet your requirements.

    How to Create a Custom Policy?

    1. Navigate to Network Scanner → Scan Policy
    2. Click New Policy.
      The Script Selection page displays.

    How is the Script Selection Page Organized?

    The page is divided into two panels for efficient policy configuration.

    • Left Panel (Family Column):
      • Displays a list of script families
      • Includes checkboxes to control inclusion in the policy
      • All families are selected by default
    • Right Panel (Scripts View):
      • Dynamically shows scripts related to the selected family
      • Enables detailed review and refinement of script selections.

    Key Benefits:

    • Simplifies selection of relevant technology families
    • Allows choosing specific scripts for detection, monitoring, or enforcement
    • Supports customization of scan policies based on infrastructure and security requirements
    1. Review the scripts from the list and customize accordingly. Click on the Next button.
      The Policy Basic Information page displays.
      A screenshot of a computer

AI-generated content may be incorrect.
    2. Provide the Policy Information:
      • Name
      • Description
    3. Click Create Policy

    The policy is now available for use in scan tasks.

    Customize an Existing Policy

    You can modify policies based on your needs:

    • Enable or disable specific checks
    • Update policy name or description

    Note: Default policies cannot be deleted; however you have an option to create a new custom policy from the default policy.

    How to Use the Category Filter for Policies?

    • Use the Category Filter to refine scripts based on scanning requirements
    • Scripts organized into categories allows easy selection
    • Select one or more categories and click Apply
    • Review the scripts displayed for the selected categories
    • Exclude(clear the checkbox) unwanted scripts and click Apply to update the policy configuration

    Note that on selecting the Authentication option from the Category filter, all the scripts that support authentication display on the screen.

    View Additional Contextual Details

    For Script Details and Guidance:

    • Click the Info button on the Edit Policy scripts page. This opens a detailed view.
    • Access relevant explanations and guidance for the selected feature or action
    • Understand functionality without navigating away from the current screen
    • Improve decision-making while configuring scripts

    Import a Policy

    You can reuse policies across environments by importing them from other accounts or organizations.

    1. Click Import Policy from the Scan policy page
    2. Select organization, account, and policy
    3. Click Import

    Note: If the policy does not exist within the organization from which you choose, then an error message displays.

    Create a Scan Task

    A scan task defines what to scan, how to scan, and when to scan. It combines scanners, policies, targets, and scheduling into a single execution workflow.

    Before You Begin

    Make sure that:

    • At least one scanner is configured
    • A scan policy is available

    Create a Scan Task

    Navigate to Network Scanner Homepage → Create New Task

    Step 1: Basic Details

    • Enter a Task Name and Description
    • Select a Scan Policy

    Make sure that you provide a name of minimum 4 characters, else the system restricts you from proceeding to the next step and displays a message.

      Step 2: Define Targets

      Specify the devices to scan:

      • Enter IP addresses or ranges (CIDR or range format or Tags criteria)
        • Example: 192.168.1.1, 192.168.1.1/32, 192.168.1.1–192.168.1.10
      • Optionally exclude specific IPs
      • Optionally assign Tags to filter target devices so that only devices matching both the IP range and selected tags are scanned

      Step 3: Configure Scan Settings

      • Select one or more Scanners.
        Note that Multi-scanner support is available only when the Saner agent version is 6.6 or later.
      • Choose scan type:
        • TCP
        • TCP & UDP
          Note that the Scan time might slightly increase for UDP Scan.
      • Select ports:
        Note that clicking the  guidance icon displays all the ports to be scanned within each category(Default, Top 1000, Top 500, Top 100).
        • Default or predefined sets
        • Custom ports (optional)

      If you want to specify your own set of custom ports, select the checkbox Enter Custom Ports and specify the TCP and UDP ports that you want scanned by the Network Scanner.

      Multi-Scanner Execution

      You can assign multiple scanners to a single scan task:

      • Workload distributes automatically
      • Reduces scan time
      • Improves performance for large environments

      [Optional]Configure Web Application Paths

      • Specify absolute paths to web applications using the WebApp Path field
      • This step is optional and can be skipped if no web applications exist
      • Enable the WebApp Path option by selecting the checkbox
      • Use available predefined paths for common endpoints (if listed)
      • Add custom paths by entering the absolute path in Add Custom WebApp Path
      • Click Add to include the custom path in the configuration

      Step 4: Assign Credentials (Optional)

      • Select credentials for authenticated scanning
      • You have an option to either create new credentials or use the existing credentials

      Step 5: Schedule Execution

      Choose how the scan must run:

      • On-demand (manual execution)
      • Scheduled execution:
        • Daily
        • Weekly
        • Monthly

      You can also configure:

      • Timezone: setting ensures that the scan runs at the correct local time
      • Task Start Window:lets you define the acceptable start and end times using drop-down options

      This guarantees that the task only begins within the specified execution window.

      Complete the Scan task creation process by clicking the Create Task button. All the configured network scan tasks display in the table within the Designate and Manage Network Scanners page.

      View Created Scan Tasks

      All the configured scan tasks are displayed in the Designate and Manage Network Scanners page. Each task displays:

      • Task name
      • Associated policy
      • Target scope
      • Scanner status
      • Execution status

      Take a Look at the Key Scan Task Actions

      After creating a scan task, you can monitor its execution, track progress, and manage task operations.

      From the task list, you can:

      • Run Scan – start execution
      • Stop Scan – abort a running task
      • Edit Task – update configuration
      • Delete Task – remove the task
      • Download Results – view the downloaded PDF report or export scan report

      Run a Scan

      • Click Run on Demand scan to start execution immediately
      • The task status changes to Ongoing

      View Scan Results

      Network scan results provide visibility into vulnerabilities, misconfigurations, assets, and network exposure across scanned devices.

      Results are automatically stored and made available across different views in the platform.

      Where to View Results?

      You can access scan results from the following sections:

      Device Details

      Navigate to Devices → Device Details to view detailed information for each scanned device.

      You can see:

      • Cyber Hygiene Score (CHS)
      • Assets
      • Posture Anomaly
      • Vulnerabilities
      • Misconfigurations
      • Ports Services

      This view provides a complete view of the network scanned devices.

      For devices managed by the Network Scanner, the   icon displays next to the device name in the Host name column. This icon signifies that its a network device without a Saner Agent installed.

      Vulnerability Management

      Navigate to the Vulnerability Management dashboard to:

      • View vulnerable devices
      • Analyze severity distribution (Critical, High, Medium, Low)
      • Identify high-risk assets
      • Track overall risk posture

      Compliance Management

      Navigate to the Compliance Management dashboard to:

      • View misconfigured devices
      • Analyze configuration issues
      • Track compliance posture

      Asset and Exposure Insights

      Network Scanner also contributes to asset visibility by identifying:

      • Installed software and services
      • Open ports and exposed services

      Key Indicators

      From scan results, you can quickly assess:

      • Overall risk level of devices
      • Critical vulnerabilities requiring immediate attention
      • Misconfigurations impacting compliance
      • Network exposure through open ports and services

      Monitor Scan Progress and Access Task Status Details

      Once you Complete the Scan run for the task you created, get an understanding of what the different statuses mean and access the detailed status information of the scanner task.

      Track Task Status

      Each scan task displays a status indicating its execution state:

      StatusDescription
      Not ScannedTask has not been executed
      OngoingScan is in progress
      SuccessScan completed successfully
      FailedScan execution failed
      AbortedScan was stopped manually

      View Detailed Scan Status

      Click on the task status to view detailed execution information.

      You can monitor:

      • Scanner availability (online/offline)
      • Targets scanned vs pending
      • Scan progress and duration
      • Script execution and result upload status

      View Scanner-Level Details

      From the detailed status view, you can:

      • Expand individual scanners
      • View scan duration and progress
      • Check targets processed by each scanner
      • Monitor last and next execution details

      Refresh Scan Status

      Use the refresh option to view the latest scan progress and results.

      Abort and Restart a Scanner Task

      Stop an ongoing scanner task by clicking the Stop Task button under the Actions column. The status of the task then changes to Aborted. If you want to restart the task, then just click the Run on Demand (arrow with circle) button once again.

      Download Scan Reports

      From the Designate and Manage Network Scanners page, click the Download button under the Action column for the corresponding network scan task. This downloads the last five network scan reports.

      Distribute the Report Via Email

      You have an option to distribute the report over email to various recipients after downloading. Just click the Email Report button and key in the email address.

      Review the Logs

      The Logs section provides a record of all activities performed within Network Scanner, helping you track actions and troubleshoot issues. Each action has a unique job code assigned.

      Access Logs

      Navigate to Network Scanner → Logs to view activity records.

      What Can You View?

      Each log entry includes:

      • Job Code (unique identifier for the activity)
      • Date and time
      • Organization and account
      • User who performed the action
      • Action description

      Filter Logs

      You can filter logs to quickly find relevant entries:

      • Account – view logs for specific accounts
      • User – track actions by specific users
      • Date range – filter logs within a selected time period

      Additional Actions

      • Clear filters to reset the view
      • Adjust the number of log entries displayed per page

      When to Use Logs?

      Use logs to:

      • Investigate scan failures or issues
      • Audit user activity
      • Validate configuration changes
      • Track scan execution history

      Job Codes Used in Network Scanner

      Job CodeDescription
      14000Network Scanner Management
      14001Initiate Discovery Scan
      14002Add Discovery Scan Configuration
      14003Update Discovery Scan Configuration
      14004Delete Discovery Scan Configuration
      14005Upload Discovery Scan Data
      14006Failed to Upload Discovery Scan Data
      14007Add Network Scan Device
      14008Failed to Add Network Scan Device
      14009Updated Network Scan Device
      14010Failed to Update Network Scan Device
      14011Failed to Add Discovery Scan Configuration
      14012Failed to Update Discovery Scan Configuration
      14013Failed to Delete Discovery Scan Configuration
      14014Stop Network Scan
      14015Delete Device
      14016Failed to Delete Device
      14017Rename Network Scan Device
      14018Failed to Rename Network Scan Device
      14019Updated Device as Network Scanner
      14020Failed to Update Device as Network Scanner
      14021Removed Device as Network Scanner
      14022Failed to Remove Device as Network Scanner
      14023Initiate Network Scan
      14024Add Network Scan Configuration
      14025Failed to Add Network Scan Configuration
      14026Update Network Scan Configuration
      14027Failed to Update Network Scan Configuration
      14028Delete Network Scan Configuration
      14029Failed to Delete Network Scan Configuration
      14030Add Network Scan Policy
      14031Failed to Add Network Scan Policy
      14032Update Network Scan Policy
      14033Failed to Update Network Scan Policy
      14034Delete Network Scan Policy
      14035Failed to Delete Network Scan Policy
      14042Stop Discovery Scan
      14043Imported Network Scan Policy
      14044Failed to Import Network Scan Policy
      14045Assign Scan Configuration
      14046Failed to Assign Scan Configuration
      14047Discovery Scan Failed
      14048Network Scan Failed
      14049Unassign Scan Configuration
      14050Failed to Unassign Scan Configuration

      Understand Network Scanner Icons

      The following table describes the different icons displayed in the Designated Network Scanner section.

      IconDescription
      Starts the Network Scan. If this icon is disabled, understand that the device is either shut down or the Saner Agent on the device is inactive.
      Aborts the ongoing Network Scan.
      Indicates that the Saner Agent on the designated network scanner is active.
      Indicates an inactive Saner Agent on the designated network scanner.
      Indicates that the Network Scanner is active and scanning.
      Indicates that the last Network Scan was aborted.
      Indicates that the Network Scanner is idle.
      Provides details of the last network scan.
      Deletes the Network Scanner.
      Indicates that the scanner has been assigned to other accounts and is functioning as a global scanner, making it accessible across multiple organizations and accounts.

      References

      Network Scanner Product Support Matrix – SecPod – Documentation

      Privilege levels for authenticated scans using Saner Network Scanner – SecPod – Documentation

      Share This Article :

      • X
      • LinkedIn
      Still stuck? How can we help?

      Saner Documentation Feedback

      Saner CVEM Remote Access User GuideSaner CVEM Cyber Hygiene Score User Guide
      Table of Contents
      • Key Concepts
        • Network Scanner
        • Global Scanner
        • Scan Policy
        • Scan Credentials
        • Scan Task
        • Multi-Scanner Execution
      • Prerequisites
      • Get Familiar with the Interface Layout
      • Scan Tasks Overview on the Homepage
      • Set Up Scanners
        • (Optional) Use Recommended Devices
        • Configure Global Scanners
        • Key Considerations
      • Configure Scan Credentials
        • When to Use Credentials?
        • Supported Credential Types
        • Add a Scan Credential
        • Manage Credentials
          • Key Considerations
      • Define and Manage Scan Policies
        • Use Default or Create Custom Policy
          • Use Default Policies
          • Create a Custom Scan Policy
            • When should you create a custom policy?
            • How to Create a Custom Policy?
          • Customize an Existing Policy
            • How to Use the Category Filter for Policies?
            • View Additional Contextual Details
          • Import a Policy
      • Create a Scan Task
        • Before You Begin
        • Create a Scan Task
          • Step 1: Basic Details
          • Step 2: Define Targets
          • Step 3: Configure Scan Settings
            • Multi-Scanner Execution
          • [Optional]Configure Web Application Paths
          • Step 4: Assign Credentials (Optional)
          • Step 5: Schedule Execution
        • View Created Scan Tasks
      • Take a Look at the Key Scan Task Actions
        • Run a Scan
          • View Scan Results
            • Device Details
            • Vulnerability Management
            • Compliance Management
          • Key Indicators
        • Monitor Scan Progress and Access Task Status Details
          • Track Task Status
          • View Detailed Scan Status
          • View Scanner-Level Details
          • Refresh Scan Status
        • Abort and Restart a Scanner Task
        • Download Scan Reports
        • Distribute the Report Via Email
      • Review the Logs
        • Access Logs
        • What Can You View?
        • Filter Logs
        • Additional Actions
        • When to Use Logs?
        • Job Codes Used in Network Scanner
      • Understand Network Scanner Icons
      • References
      Copyright 2026 - SecPod. All Rights Reserved. Privacy Policy.
      SanerNow Version 6.5.x