Solved

Are VA scans normally done on servers zones/subnets only or includes users & Management zone?

Posted on 2016-10-09
4
54 Views
Last Modified: 2016-10-24
What's the best practice out there?  Only scan server zones ie
DMZ, App server (internal) zone & DB zone?

What about servers' Management zone & PCs/users zones?

Can I say the reasons PCs /users subnets are not being scanned
because these are of low critical devices and to scan them will
take days (we have 2800 PCs) ?
0
Comment
Question by:sunhux
4 Comments
 
LVL 17

Assisted Solution

by:OriNetworks
OriNetworks earned 150 total points
ID: 41835926
Scan EVERYTHING! The weakest link in the chain motto fits in well here.
0
 

Author Comment

by:sunhux
ID: 41837022
in our headquarter, there are 30000 PCs  (& 1200 servers) : I can't imagine scanning
30000 PCs/laptops considering nowadays the PCs have the sizing with similar number
of files/services as servers
0
 
LVL 61

Accepted Solution

by:
gheist earned 350 total points
ID: 41845803
Your question is a little vague.

for scanning 30000 hosts probably best is to select random sub-sample for first scan, eliminate defects found on all 30000 hosts, extend sample, rinse, repeat and so on until comfortable.

We have scanner hooked to AD logs, so that long-absent laptops are attacked with all remedy tools possible, and we scan 100 random out of 5000 hosts with patch scanner and all powered on-hosts with network-only scanner during weekends after "Patch Tuesday". That way we scan all servers and all workstations that pretend to be servers.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now