Configure credentialed scanning for Linux systems
You can provide credentials to a Managed Risk Scanner to allow the scanner to scan your environment with elevated permissions.
Note: To configure credentialed scanning in the Risk Dashboard, see Configure credentialed scanning for Linux systems in the Risk Dashboard.
On Linux, credentialed scans use SSH on port 22 to authenticate using a username and either a password or SSH keys.
Note:
- If you rotate your credentials, you must reset them on the scanner as well.
- To minimize security risks, Arctic Wolf recommends that you use these credentials for scanning only. Do not provide more permissions to these credentials or use them with systems other than the scanner.
These resources are required:
- An account with root access.
- If you authenticate with an SSH key — A key that is:
- Private.
- Owned by the user account that the credentialed scans.
- Of the Ed25519, ECDSA, RSA, or DSA key type.
Note: Ed25519 is generally considered more secure, but not all hosts support Ed25519.
- In either PEM or OpenSSH format.
- If you authenticate using a username — A valid username, which can contain these characters:
- Any alphanumeric character
- -
- _
- @
- .
- \
These actions are required:
- Make sure that the scanner can sign into scan targets without access policy restrictions on targets.
- Make sure the
sshddaemon is running on the scan targets to authenticate SSH sign-in attempts from the scanner. - Make sure that scan targets have these
sshd_configdefault settings:MaxSessions: 10MaxAuthTries: 6PubkeyAuthentication yes
- Install
locateormlocatetoolon the scan target. These commands reduce calls to the command used to search for files. As a result, they improve search performance and reduce resource usage on the target system. - If you authenticate with an SSH key, run this command to generate an SSH key pair:
SHELL
ssh-keygen -t <key_type>Where:- key_type is the type of SSH key you want to create. For example,
ed25519.
Note: If you experience issues, confirm that the keys can be properly used to authenticate across the network before you submit a ticket to your Concierge Security® Team (CST). - key_type is the type of SSH key you want to create. For example,