Welcome to the Enveedo Knowledge Hub
Setup Your Vulnerability Scan

Purpose: Conduct initial technical assessment using Enveedo's Vulnerability Scan, powered by Tenable IO, to identify security gaps and establish a baseline for improvement tracking.

 

What Enveedo's Vulnerability Scan Does: Enveedo provides the power of Tenable's professional vulnerability scanning capabilities through a simplified interface. When you initiate a scan, the system automatically configures and runs a basic network security scan.

 

What Happens During Your Scan: Behind the scenes, the scan performs multiple assessment techniques to provide comprehensive coverage of your security posture.

 

What Happens During Your Scan: Behind the scenes, the scan performs specific assessment techniques based on the active configuration settings.

 

Network Discovery Process:

  • Host Discovery: Uses ARP and TCP ping methods to identify active systems on your network
  • Port Scanning: Performs TCP SYN scanning to identify open services and applications
  • Service Detection: Identifies specific applications, versions, and configurations running on discovered ports
  • Operating System Fingerprinting: Determines OS types and versions for targeted vulnerability checks

 

Vulnerability Assessment Methods:

  • Configuration Analysis: Reviews system settings against security best practices
  • Patch Level Assessment: Identifies missing security updates and patches
  • Compliance Checking: Evaluates against security frameworks and standards

 

Active Scan Configuration: The scan runs with these specific enabled settings:

 

Network Protocols:

    • SSH (netstat): Enabled for deeper Unix/Linux system assessment
    • WMI (netstat): Enabled for comprehensive Windows system analysis
    • SNMP: Enabled for network device and system information gathering
    • TCP SYN Scanning: Active for reliable port identification

 

Discovery Methods:

    • ARP Ping: Enabled for local network host discovery
    • TCP Ping: Enabled for reliable host identification across network segments
    • Safe Checking: Enabled to avoid disrupting production systems

 

Scan Results Categories:

    • Critical: Vulnerabilities requiring immediate attention (actively exploitable)
    • High: Significant security risks needing prompt remediation
    • Medium: Important issues for planned remediation cycles
    • Low: Minor issues and informational findings
    • Informational: Advisory findings and general security recommendations

 

Setting Up Your Scan:

  1. Navigate to Settings > Vulnerability Scan Settings from the main menu
  2. Add a New Scan Target IP address or domain (1 per target)
  3. Agree to the terms & conditions
  4. Confirm and launch the scan through the simplified interface
  5. Monitor progress inside Findings and receive results integrated into your Dashboard

 

What You'll Receive:

  • Integrated vulnerability findings in your Enveedo dashboard
  • Risk scoring that feeds into your overall security posture
  • Prioritized remediation recommendations
  • Tracking capabilities for vulnerability management over time

 

Important Notes:

  • Security scanning is designed to be safe for production environments
  • Network performance impact is minimized through intelligent throttling
  • Results automatically integrate with your Enveedo risk assessments
  • Follow-up scans track your improvement progress
  • While scan configurations employ intelligent throttling to minimize performance impacts, inherent risks may still exist. Additionally, there is no guarantee of identifying all vulnerabilities or complete security.

 

Firewall Configuration Requirements: If your organization uses firewalls or network access controls, you may need to allow traffic from Tenable's scanning infrastructure. The following IP ranges should be permitted for inbound scanning:

 

US East Cloud Scanners:

  • us-east-1: 34.201.223.128/25, 44.192.244.0/24, 44.206.3.0/24, 54.175.125.192/26
  • us-east-2: 13.59.252.0/25, 18.116.198.0/24, 3.132.217.0/25

 

US West Cloud Scanners:

  • us-west-1: 13.56.21.128/25
  • us-west-2: 34.223.64.0/25, 35.82.51.128/25, 35.86.126.0/24, 35.93.174.0/24, 44.242.181.128/25

 

IPv6 Ranges:

  • us-east-1: 2600:1f18:6f4c:8000::/56
  • us-east-2: 2600:1f16:8ca:e900::/56
  • us-west-2: 2600:1f14:141:7b00::/56

 

Contact your IT team or network administrator to configure these allowlists before initiating your first scan.

 

 

Phase 1 Completion Checklist

Before moving to Phase 2, ensure you have completed:

  • Business Profile: Comprehensive organizational information entered
  • Risk Scorecard: Initial baseline established and reviewed
  • Security Stack: Major security tools inventoried
  • Integrations: At least 1-2 critical systems connected
  • Team Access: Key team members invited and onboarded
  • Vulnerability Scan: Initial scan completed and results reviewed

 

Expected Timeline: 1-7 days, depending on organizational complexity and integration requirements.

 

Phase 1 Success Metrics:

  • Platform configured with organizational context
  • Team members actively using assigned features
  • Initial integrations providing automated data
  • Baseline security posture established
  • Foundation ready for strategic planning

 

What's Next?

With your foundation established, you're ready for Program Development, where you'll:

  • Review and analyze findings from your scans and assessments
  • Complete the Crown Jewel Workshop to identify critical assets
  • Update your Risk Register based on discoveries and review AI-generated recommendations
  • Complete comprehensive assessments
  • Add critical vendors to start third-party risk management

 

 

Ready to continue? Proceed to Phase 2: Program Development to transform your baseline into a strategic cybersecurity program.

 

Questions during setup? Our Customer Success Team is available to provide guidance and ensure your successful onboarding.

Did this answer your question?