top of page
office-table-with-blank-notebook-and-laptop-coff.jpg

Blog

Check your systems Readiness for Vulnerability Assessment scan prerequisites

Updated: Apr 25

Meet all requirements for successful Vulnerability Assessment Scan


Zabbix
Prerequisites


Before kicking off a Vulnerability Assessment, you need to ensure your environment is fully prepared. In this guide, you’ll meet all requirements to perform a successful VA scan, minimize false positives, avoid service disruptions, and get actionable results.


Prerequisites for the Target Environment

For a smooth and efficient assessment, certain prerequisites should be met by the target machines. Here’s a list categorized by operating systems and devices.


General Requirements

  • Ability to conduct scans onsite or remotely.

  • Network segments allow the scanner to access the internet if required.

  • Firewall allows specific inbound and outbound traffic rules based on predefined ports and protocols.



Sample Device List
Sample Device List
Windows OS Prerequisites

Non-Active Directory Environment


  • Local admin credentials.

  • Disabled User Account Control (UAC).

  • Enabled services:

  • File and Printer Sharing (SMP)  

  • Windows Management Instrumentation (WMI)  

  • Remote Registry Service

  • Firewall settings allowing: TCP Ports 135, 139, and 445.

  • Accessible system administrator shares (e.g., IPC$, C$, Admin$).


Active Directory Environment


  • Active Directory admin credentials for domain-joined machines.

  • File and Printer Sharing (SMP)  

  • Windows Management Instrumentation (WMI)  

  • Remote Registry Service

macOS Prerequisites
  • Administrative privileges with remote login (SSH) enabled.

  • Full disk access permissions enabled.

Linux/Unix Prerequisites
  • Enabled SSH service (default port 22).

  • Root credentials accessible.

Switches and Firewall Prerequisites
  • Access via SSH service (port 22).

  • Admin or root-level credentials.

  • Firewall settings configured to allow inbound traffic on TCP ports:

    • Scanner Inbound traffic: TCP 8834  

    • Scanner Outbound traffic: TCP 25, 443, 53  


Why Vulnerability Assessment Should Be Your First Step


Effective cybersecurity starts with a clear understanding of your vulnerabilities. Our VA service lays this foundation while providing you with actionable guidance to strengthen your defenses.


Don’t wait for a breach to expose your vulnerabilities.

Contact our team today and take the first step toward a resilient, secure infrastructure


Comments


Secure your system now today
Image (2).png

Need More Information?

Contact our expert team today, whether you need more information, specific consultations, or immediate issue resolution, we are ready to assist you with just one click.

Greenwill Solution is ready to help you achieve your technology goals efficiently and securely.

bottom of page