Solved

How to scan external IP for vulnerabilities?

Posted on 2010-08-28
5
975 Views
Last Modified: 2012-08-14
How can I scan my companies external facing IP for vulnerabilities, such as malicious attacks, attempts at gaining access to our network, and any other bad things like that? I know about the QualysGuard service but I'm on a tight budget. Thanks.
0
Comment
Question by:canalicomputers
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 6

Accepted Solution

by:
radnbne earned 500 total points
ID: 33550669
You could start with Shields up.  An internet based test of your external fingerprint.

https://www.grc.com/x/ne.dll?bh0bkyd2

0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550672
if you have a machine on another internet connection you could run nessus ( http://www.nessus.org/nessus/ ) on it to scan you network
0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550687
An alternative to nessus (as they now seem to be pushing their buy a commercial license) is http://www.openvas.org/index.html
0
 
LVL 10

Expert Comment

by:yasserd
ID: 33554592
"for vulnerabilities"
You may subscribe to any pay-per-scan service (which doesn't require buying any hardware) like Qualys, eEye Retina, Mcafee..etc
Or you may do it yourself using either commercial tools like Nessus and the above mentioned ones or free ones like openvas (which is based originally on Nessus).

"malicious attacks, attempts at gaining access to our network"
These types of things can be detected by enabling logging of your firewall and/or having an IPS. You can then analyze these logs to look for suspicious activities.
0
 

Author Closing Comment

by:canalicomputers
ID: 33671235
Thanks
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month10 days, 21 hours left to enroll

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question