Check your systems Readiness for Vulnerability Assessment scan prerequisites
- Theethat Thamwasin
- Apr 24
- 2 min read
Updated: Apr 25
Meet all requirements for successful Vulnerability Assessment Scan

Before kicking off a Vulnerability Assessment, you need to ensure your environment is fully prepared. In this guide, you’ll meet all requirements to perform a successful VA scan, minimize false positives, avoid service disruptions, and get actionable results.
Prerequisites for the Target Environment
For a smooth and efficient assessment, certain prerequisites should be met by the target machines. Here’s a list categorized by operating systems and devices.
General Requirements
Ability to conduct scans onsite or remotely.
Network segments allow the scanner to access the internet if required.
Firewall allows specific inbound and outbound traffic rules based on predefined ports and protocols.

Windows OS Prerequisites
Non-Active Directory Environment
Local admin credentials.
Disabled User Account Control (UAC).
Enabled services:
File and Printer Sharing (SMP)
Windows Management Instrumentation (WMI)
Remote Registry Service
Firewall settings allowing: TCP Ports 135, 139, and 445.
Accessible system administrator shares (e.g., IPC$, C$, Admin$).
Active Directory Environment
Active Directory admin credentials for domain-joined machines.
File and Printer Sharing (SMP)
Windows Management Instrumentation (WMI)
Remote Registry Service
macOS Prerequisites
Administrative privileges with remote login (SSH) enabled.
Full disk access permissions enabled.
Linux/Unix Prerequisites
Enabled SSH service (default port 22).
Root credentials accessible.
Switches and Firewall Prerequisites
Access via SSH service (port 22).
Admin or root-level credentials.
Firewall settings configured to allow inbound traffic on TCP ports:
Scanner Inbound traffic: TCP 8834
Scanner Outbound traffic: TCP 25, 443, 53
Why Vulnerability Assessment Should Be Your First Step
Effective cybersecurity starts with a clear understanding of your vulnerabilities. Our VA service lays this foundation while providing you with actionable guidance to strengthen your defenses.
Don’t wait for a breach to expose your vulnerabilities.
Contact our team today and take the first step toward a resilient, secure infrastructure
Comments