Purpose: Conduct initial technical assessment using Enveedo's Vulnerability Scan, powered by Tenable IO, to identify security gaps and establish a baseline for improvement tracking.
What Enveedo's Vulnerability Scan Does: Enveedo provides the power of Tenable's professional vulnerability scanning capabilities through a simplified interface. When you initiate a scan, the system automatically configures and runs a basic network security scan.
What Happens During Your Scan: Behind the scenes, the scan performs multiple assessment techniques to provide comprehensive coverage of your security posture.
What Happens During Your Scan: Behind the scenes, the scan performs specific assessment techniques based on the active configuration settings.
Network Discovery Process:
- Host Discovery: Uses ARP and TCP ping methods to identify active systems on your network
- Port Scanning: Performs TCP SYN scanning to identify open services and applications
- Service Detection: Identifies specific applications, versions, and configurations running on discovered ports
- Operating System Fingerprinting: Determines OS types and versions for targeted vulnerability checks
Vulnerability Assessment Methods:
- Configuration Analysis: Reviews system settings against security best practices
- Patch Level Assessment: Identifies missing security updates and patches
- Compliance Checking: Evaluates against security frameworks and standards
Active Scan Configuration: The scan runs with these specific enabled settings:
Network Protocols:
- SSH (netstat): Enabled for deeper Unix/Linux system assessment
- WMI (netstat): Enabled for comprehensive Windows system analysis
- SNMP: Enabled for network device and system information gathering
- TCP SYN Scanning: Active for reliable port identification
Discovery Methods:
- ARP Ping: Enabled for local network host discovery
- TCP Ping: Enabled for reliable host identification across network segments
- Safe Checking: Enabled to avoid disrupting production systems
Scan Results Categories:
- Critical: Vulnerabilities requiring immediate attention (actively exploitable)
- High: Significant security risks needing prompt remediation
- Medium: Important issues for planned remediation cycles
- Low: Minor issues and informational findings
- Informational: Advisory findings and general security recommendations
Setting Up Your Scan:
- Navigate to Settings > Vulnerability Scan Settings from the main menu
- Add a New Scan Target IP address or domain (1 per target)
- Agree to the terms & conditions
- Confirm and launch the scan through the simplified interface
- Monitor progress inside Findings and receive results integrated into your Dashboard
What You'll Receive:
- Integrated vulnerability findings in your Enveedo dashboard
- Risk scoring that feeds into your overall security posture
- Prioritized remediation recommendations
- Tracking capabilities for vulnerability management over time
Important Notes:
- Security scanning is designed to be safe for production environments
- Network performance impact is minimized through intelligent throttling
- Results automatically integrate with your Enveedo risk assessments
- Follow-up scans track your improvement progress
- While scan configurations employ intelligent throttling to minimize performance impacts, inherent risks may still exist. Additionally, there is no guarantee of identifying all vulnerabilities or complete security.
Firewall Configuration Requirements: If your organization uses firewalls or network access controls, you may need to allow traffic from Tenable's scanning infrastructure. The following IP ranges should be permitted for inbound scanning:
US East Cloud Scanners:
- us-east-1: 34.201.223.128/25, 44.192.244.0/24, 44.206.3.0/24, 54.175.125.192/26
- us-east-2: 13.59.252.0/25, 18.116.198.0/24, 3.132.217.0/25
US West Cloud Scanners:
- us-west-1: 13.56.21.128/25
- us-west-2: 34.223.64.0/25, 35.82.51.128/25, 35.86.126.0/24, 35.93.174.0/24, 44.242.181.128/25
IPv6 Ranges:
- us-east-1: 2600:1f18:6f4c:8000::/56
- us-east-2: 2600:1f16:8ca:e900::/56
- us-west-2: 2600:1f14:141:7b00::/56
Contact your IT team or network administrator to configure these allowlists before initiating your first scan.

Phase 1 Completion Checklist
Before moving to Phase 2, ensure you have completed:
- ✅ Business Profile: Comprehensive organizational information entered
- ✅ Risk Scorecard: Initial baseline established and reviewed
- ✅ Security Stack: Major security tools inventoried
- ✅ Integrations: At least 1-2 critical systems connected
- ✅ Team Access: Key team members invited and onboarded
- ✅ Vulnerability Scan: Initial scan completed and results reviewed
Expected Timeline: 1-7 days, depending on organizational complexity and integration requirements.
Phase 1 Success Metrics:
- Platform configured with organizational context
- Team members actively using assigned features
- Initial integrations providing automated data
- Baseline security posture established
- Foundation ready for strategic planning
What's Next?
With your foundation established, you're ready for Program Development, where you'll:
- Review and analyze findings from your scans and assessments
- Complete the Crown Jewel Workshop to identify critical assets
- Update your Risk Register based on discoveries and review AI-generated recommendations
- Complete comprehensive assessments
- Add critical vendors to start third-party risk management
Ready to continue? Proceed to Phase 2: Program Development to transform your baseline into a strategic cybersecurity program.
Questions during setup? Our Customer Success Team is available to provide guidance and ensure your successful onboarding.
