home home
Weitere Websites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Demo anfordern Interne Dokumentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentifizierung
  • Sensoren, Scanner und Log Collector
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Entwickler und OEM
  • Produktaktualisierungen
  • Weitere Informationen zu Produkten und Dienstleistungen
  • Legacy Risk Dashboard
  • Legacy-Analysen
  • English
  • 日本語
  • Deutsch
  • Français
Anmelden
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentifizierung
  • Sensoren, Scanner und Log Collector
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Entwickler und OEM
  • Produktaktualisierungen
  • Weitere Informationen zu Produkten und Dienstleistungen
  • Legacy Risk Dashboard
  • Legacy-Analysen
  • English
  • 日本語
  • Deutsch
  • Français
Anmelden

Legacy Risk Dashboard

Legacy Risk Dashboard
  • Risk Dashboard
    • Requirements
    • Access
    • Getting Started Video
    • Routine Tasks
    • Overview Page
      • View Risk Metrics
      • View Risk Score Trends
      • Evaluate Current Risk Score
      • Download an Executive Summary
      • Download a Risk Assessment
      • Download Risk Score Trends
      • Download Asset Class Health
      • Download Asset Health
    • Management Plan Page
      • Plan section
      • View a Plan
      • View Unassigned Risks
      • Create a Plan
      • Move Risks Between Plans
      • Edit the Plan Timeline Scale
      • Close a Plan
      • Download Unassigned Risks Table Data
    • Risks Page
      • Filters Section
      • Default Filters
      • Risk States
      • Risk Statuses
      • Risks and Unassigned Risks Sections
      • Risk Information Pane
      • Risk State and Status Lifecycles
      • Rescan Assets with Risks
      • Review Active Risks
      • Review Inactive Risks
      • Review Mitigated Risks
      • Review Risks that Failed Validation
      • Review Agent Debug Scans
      • View Risks by Due Date
      • Edit State of Inactive Risks
      • Edit Risks
      • Run an Agent Debug Scan
      • Accept a Vulnerability
      • Assign User and Due Date
      • Unassign User and Due Date
      • Download Remediation Report
      • Download Risks table data
    • Assets Page
      • Asset Catalog Section
      • Asset Filters
      • Review Assets
      • View an Asset Profile
      • Create an Asset Tag
      • Edit Assets
      • Edit Asset Tags
      • Edit Device Name
      • Edit Category
      • Edit Criticality
      • Rescan Assets
      • Reset Sensor Details
      • Remove an Asset
      • Download Asset Catalog Data
    • Agent Page
      • Target Group Overview
      • View Risk Charts
      • View Agent Risks
      • View Agent Scan Details
      • View Agent Audits
      • Enable an Agent Scan Schedule
      • Stop an Agent Scan
    • EVA Page
      • EVA Overview
      • Target Group Overview Section
      • Target Group to Risk Severity Section
      • Target Group to Risk Severity Filters
      • Risks by Target Group Section
      • Filter Target Group by Tags
      • Stop Active and Scheduled EVA Scans
      • Download a Target Group to Risk Severity Chart
    • User Config Page
    • Scanner Config Page
      • IVA Overview
      • Scanner Configuration Section
      • Scanning Schedule Section
      • Credentialed Scanning Section
      • Configure Credentialed Scanning
        • VMware ESXi
        • Linux
        • Windows
      • Scanning Queue Table
      • View Scanner Configuration
      • View Scan Queue
      • Configure a Scanner
      • Create a Scan Schedule
      • Add an IP to the Allowlist
      • Add an IP to the Denylist
      • Enable Brute Force Scanning
      • Brute Force Scanning Username Checks
      • Enable CGI Scanning
      • Enable Only Ping the Target Mode
      • Enable a Scan Schedule
      • Edit a Scan Schedule
      • Stop Scans
      • Disable Brute Force Scanning
      • Disable CGI Scanning
      • Disable a Scan
      • Remove a Scan Schedule
      • Verify that IVA Rescan is Running
      • Verify Scanner Health
    • Scanner Console Page
    • Tools
    • Troubleshoot
Startseite ▸ Legacy Risk Dashboard ▸ Risk Dashboard ▸ Scanner Config Page
Diese Seite teilen
  • LinkedIn
  • X
  • Facebook
  • Email

Configure a scanner

  1. Create a scanner schedule to configure the IP addresses or networks of the targets to scan, the scanning type, and the scan priority.

    See Create a new scan schedule for more information.

  2. Configure the IP addresses that you do not want the scanner to scan.

    See Add an IP address or IP address range to the denylist for more information.

  3. Configure the IP address that you want the scanner to scan.

    See Add an IP address or IP address range to the allowlist for more information.

Physical Scanner Virtual Scanner Risk Dashboard Managed Risk Installation or Configuration User Guide Public

Zuletzt aktualisiert: March 30, 2026

Zurück View Scan Queue Weiter Create a Scan Schedule

Themen entdecken

Aurora Endpoint Security Managed Detection and Response (MDR) Managed Risk Managed Security Awareness (MA) Incident Readiness and Response Arctic Wolf Unified Portal MSP Portal Authentifizierung Sensoren, Scanner und Log Collector Arctic Wolf Agent Onboarding Portal Active Response, Log Forwarding, and Security Monitoring Active Directory Cloud Security Posture Management (CSPM) IT Service Management (ITSM) Entwickler und OEM Produktaktualisierungen Weitere Informationen zu Produkten und Dienstleistungen Legacy Risk Dashboard Legacy-Analysen
Arctic Wolf Help Documentation
Datenschutzrichtlinie
Nutzungsbedingungen
Cookie-Richtlinie
Erklärung zur Barrierefreiheit
Informationssicherheit
Nachhaltigkeitserklärung
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.