RedCheck vulnerability scanning

To scan for vulnerabilities you need to do the following:

  1. Launch the program by clicking the icon on the RedCheck desktop. This will automatically start the process of getting signature updates. Successful updates are indicated by green markers in the status bar at the bottom of the window.
  2. In the Tools - Account Manager menu, add an account with the appropriate type. Uncheck the option: "Save using encryption".

  1. On the Hosts tab, use the context menu to create a network node, specifying the dns name and description, select Credentials for the host and scan type (with agent).

4. On the Hosts tab - select a host and click Ping in the context menu. Select the appropriate tunnel and check the availability of the host by pressing Ping. The red marker shows which tunnel is available for the host.

5. On the Hosts tab, select a host and select "Create a task for..." from the context menu, select Scan Type and press Next.

Next, select a host or group of hosts. Select default credentials - these will be used if no individual credentials were specified for the host. Select the data retrieval method and check "Use saved credentials when available".

You can leave the scan type and Profiles unchanged - Next, Create.

 

  1. On the Tasks tab, you can view the status of tasks.

  1. In the History tab you can see the results of the tasks.

  1. After opening a task you can make a report on the detected vulnerabilities.

  1. Detailed instructions are available on the manufacturer's website: https://www.redcheck.ru/downloads/
  • 57 Users Found This Useful
Was this answer helpful?

Related Articles

RedCheck server deployment

Installation of the RedCheck server is done by deploying a cloud-based VM template with...

RedCheck Agents Installation

  1) Windows OS The agent installer is located on RedCheck server in C:\RC_Install. Only the...

Powered by WHMCompleteSolution