Tune vulnerability scanners
Vulnerability scanners generate a large amount of activity on your network while the system continuously scans applications for security weaknesses. By creating tuning rules you can reduce low-value detections that are associated with known scanner activity.
- Communicate with the teams in your organization that configure scanners. Effective tuning rules require an understanding of scanning targets and schedules.
- Confirm that your ExtraHop sensor is correctly classifying the location of your scanner. For example, if you are hosting a vulnerability scanner in a part of your network that is not observed by an ExtraHop sensor, that traffic will appear as external. You might need to specify a network locality for the traffic before you can add the remote scanner to a tuning rule.
- If you are dealing with cloud-based scanners or need to create a large number of tuning rules, you can tune detections with the ExtraHop REST API.
Inventory vulnerability scanners and targets
Before you begin creating tuning rules, you should review all vulnerability scanners that are active in your environment.
- Inventory your scanners
- Compile a list of all the vulnerability scanners that are active in your
environment, including the following type of details:
- Applicable IP addresses and hostnames for scanning devices.
- The name of your external scanning provider, such as Teneble or Qualys. Only the provider name is needed for most external scanning services as ExtraHop maintains a library of IP addresses for common cloud-based scanning providers.
- Associated CIDR blocks for less common external scanning services.
- Inventory your scanner targets
- Compile a list of all networks that are a target of vulnerability scanners. Your list should include all networks, CIDR blocks, or device groups that are regularly scanned by your vulnerability scanners.
You now have a list of vulnerability scanner devices to create tuning rules. Local vulnerability scanner devices should appear in the Vulnerability Scanner device group so that you can add the Vulnerability Scanner device group in a tuning rule. Each of your external scanning services can be added to individual tuning rules.
Review the Vulnerability Scanner device group
Confirm that all of your local scanning devices are discovered and classified in the Vulnerability Scanner device group.
Create a tuning rule to hide the Vulnerability Scanner device group
Create a tuning rule to hide all detections where the offender is a device that is a member of the built-in Vulnerability Scanner device group.
Before you begin
- You can hide individual devices directly from detections where the device appears as an offender.
- Users must have full write or higher privileges to tune a detection.
- Learn about tuning best practices.
Add a tuning rule to hide an external scanning service
Create a tuning rule to hide all detections where the offender is an external scanning service.
Note: | External scanning services are tuned by IP addresses or CIDR blocks, which can be masked by load balancers or gateway devices in your network. If you create a rule that is failing to hide an external scanning service, you might need to specify a network locality or create a custom device with the service CIDR block, and then create a tuning rule with your new locality or custom device. |
Before you begin
- Obtain the name of your scanning service provider. The ExtraHop system will automatically supply the IP addresses for common external scanning services. For less common providers, obtain the CIDR block associated with the service.
- You can hide individual devices or external scanning services directly from detections where the device appears as an offender.
- Users must have full write or higher privileges to tune a detection.
- Learn about tuning best practices.
Thank you for your feedback. Can we contact you to ask follow up questions?