The configuration requires PowerShell version 5.0 or newer, although we recommend updating PowerShell to the latest version. To check the PowerShell version and update it: Open a PowerShell console with administrative privileges. Run the following command to check the installed version of PowerShell: Get-Host | Select-Object Version If necessary, download the required version of PowerShell […]
Category: F-Secure
F-Secure Business(1304)
F-Secure Endpoint(43)
F-Secure Home(1301)
Configuring Windows authenticated scanning (WinRM) (F-Secure)
Before applying changes, F-Secure recommends that you discuss all potential changes with your network administrator. The following summarizes the requirements for enabling WinRM authenticated scanning for Windows: If a Linux scan node is in use, a user account must meet the following requirement: Local user account added to the Administrators group If a Windows scan node is […]
Windows authenticated scanning (WinRM) (F-Secure)
This section provides instructions on how to prepare your internal network for authenticated scanning using Windows Remote Management (WinRM). F-Secure Elements Vulnerability Management supports two ways of authenticating to Windows systems: If the scan node is deployed on a Windows computer, use the scan node service account credentials (recommended) Specify credentials explicitly in the F-Secure […]
Changing the frequency for endpoint status updates (F-Secure)
You can set how often Radar Endpoint Agent sends updated status information on vulnerabilities in the devices in your network to the Elements Security Center. Note: In addition to the scheduled status updates, endpoints automatically send any information to the Elements Security Center from scans that are triggered by changes to the installed software. Select the Settings page […]
Finding internet-facing systems (F-Secure)
You can find your organization’s internet-facing systems in Elements Vulnerability Management with Internet discovery. Internet discovery uses crawling and port mapping to allow you to collect data on public systems. You can search for data based on location, top-level domain, pay-level domain, keywords, host name, and IP address. You can add the discovered hosts to […]
Generating recordings with Fiddler (F-Secure)
Fiddler is a free web debugging proxy for various browsers, systems, and platforms. Download Fiddler. Configure your browser to use it as proxy on localhost port 8888. This is Fiddler’s default proxy configuration. Browse the target web application and save the Fiddler recording as a SAZ archive: Select the list of URLs you want to export. Select Save > Selected Sessions > in ArchiveZIP… from the […]
Generating recordings with Burp Proxy (F-Secure)
Burp Proxy is an intercepting proxy server for security testing of web applications. Download Burp Suite (Free Edition) and run it. If you are not familiar with the tool, read the Getting started with Burp Suite guide. Record the target application. Save the data to an XML file: Go to the Proxy > History tab. Select the requests from the list […]
Web scan recordings (F-Secure)
Recordings are used to feed web scans with valid HTTP requests to use during scanning. With a recording, the scanner can follow a normal user’s activity, and will as a result get deeper into the application’s logic and potentially identify more vulnerabilities. Recordings are useful when certain functionality cannot be identified by the crawling engine […]
Adding a web scan (F-Secure)
You can add new web scans to any scan group that is configured to include them. To add and configure a new web scan: Go to the Network scans page. Click the menu icon and select Add web scan. Enter the general settings for the scan: Enter the URL that you want to scan in the Scan target URL field. […]
Web scan (F-Secure)
Web scan allows you to scan and test web applications. You can use web scans during the development of new applications as part of the development life cycle. This results in being able to uncover vulnerabilities faster, thus significantly reducing the cost and amount of resources required to mitigate vulnerabilities at a later stage, as […]