Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

SecPoint Products / Penetrator /

Cloud Vulnerability Node Scan Distribution

The Scan Distribution feature has been revised and improved. This feature makes possible to distribute a vulnerability scan over a number of remote Penetrators, to speed up processing and take benefit from all the available licenses.


In fact when a scan is distributed, the local CPU is not engaged and neither is the count of available concurrent scans. Conversely, when some scans are sent for execution to a remote Penetrator, they are executed according to the available license count on the remote unit.

This feature is available through menu Distribution. It requires that one Penetrator is configured as Master and one or more Penetrators as Node Client.




To properly configure the Scan Distribution, you should first configure the feature on the Node Client Penetrator. Go to menu Distribution > Master Penetrator and click to add a Master Penetrator. Then enter the IP address of the Master Penetrator, a description and click OK.



On the Master Penetrator, go to menu Distribution > Node Client Penetrator and add the IP address of the Node Client Penetrator and a description.






The Master Penetrator will check for the presence of the Node Client and, if it’s available, the Status will be OK.



Starting a scan on a remote Penetrator

When Node Client and Master have been configured, starting a scan on a remote Penetrator is straightforward. In the Master Penetrator, go to Vulnerability > New Vulnerability Scan, enter the Scan name and click Next. In the next page, enter the host name or the IP address(es) you want to scan, and, in the next field, choose the Node Client Penetrator where the scan will be performed. You can also set the advanced parameters in the Advanced Setup page as you would do for a local scan.


 
In the same scan It is also possible to mix IP addresses to be scanned on the local and on the remote Penetrator, or even remote scans to be performed on different Node Client Penetrators.



When a Distributed scan is running, the Node Client Penetrator will periodically send information to the Master Penetrator about the count of vulnerabilities found so far on each target.

This count is visible in the Master Penetrator as for local scans. Detailed information on the vulnerabilities, though, is only available when the scan is complete. Therefore the Snapshot functions   are not available while the scan is running, and if you try to get a snapshot, the following message is displayed.

➤ Related pages
About Vulnerability Assessment
Cloud Vulnerability Node Scan Distribution
How to connect Penetrator Vulnerability Scanning Appliance
Information Vulnerability Scanner
Latest Penetrator Change Log
Network Security Scanner
Network security vulnerabilities
On Demand Vulnerability Management
Penetrator Awards and Reviews
Penetrator Comparison
Penetrator Models
Penetrator Questions FAQ
Penetrator Quick Setup Guide
Penetrator S7 Appliance
Penetrator Scanner Sitemap
Penetrator Scanner Visio Stencils
Pricing of a Vulnerability Scanner?
The Best #1 Security Scanner
Vulnerability Management Benefits
Vulnerability Scan Wordpress
Vulnerability Scanning Methodology
Vulnerability Scanning ROI

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef