home home
Weitere Websites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Demo anfordern Interne Dokumentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentifizierung
  • Sensoren, Scanner und Log Collector
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Entwickler und OEM
  • Produktaktualisierungen
  • Weitere Informationen zu Produkten und Dienstleistungen
  • Legacy Risk Dashboard
  • Legacy-Analysen
  • English
  • 日本語
  • Deutsch
  • Français
Anmelden
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentifizierung
  • Sensoren, Scanner und Log Collector
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Entwickler und OEM
  • Produktaktualisierungen
  • Weitere Informationen zu Produkten und Dienstleistungen
  • Legacy Risk Dashboard
  • Legacy-Analysen
  • English
  • 日本語
  • Deutsch
  • Français
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Demo anfordern
Interne Dokumentation
Anmelden

Legacy Risk Dashboard

Legacy Risk Dashboard
  • Risk Dashboard
    • Requirements
    • Access
    • Getting Started Video
    • Routine Tasks
    • Overview Page
    • Management Plan Page
    • Risks Page
    • Assets Page
    • Agent Page
    • EVA Page
    • User Config Page
    • Scanner Config Page
      • IVA Overview
      • Scanner Configuration Section
      • Scanning Schedule Section
      • Credentialed Scanning Section
      • Configure Credentialed Scanning
      • Scanning Queue Table
      • View Scanner Configuration
      • View Scan Queue
      • Configure a Scanner
      • Create a Scan Schedule
      • Add an IP to the Allowlist
      • Add an IP to the Denylist
      • Enable Brute Force Scanning
      • Brute Force Scanning Username Checks
      • Enable CGI Scanning
      • Enable Only Ping the Target Mode
      • Enable a Scan Schedule
      • Edit a Scan Schedule
      • Stop Scans
      • Disable Brute Force Scanning
      • Disable CGI Scanning
      • Disable a Scan
      • Remove a Scan Schedule
      • Verify that IVA Rescan is Running
      • Verify Scanner Health
    • Scanner Console Page
    • Tools
    • Troubleshoot
Startseite ▸ Legacy Risk Dashboard ▸ Risk Dashboard ▸ Scanner Config Page
Diese Seite teilen
  • LinkedIn
  • X
  • Facebook
  • Email

Configure a scanner

  1. Create a scanner schedule to configure the IP addresses or networks of the targets to scan, the scanning type, and the scan priority.

    See Create a new scan schedule for more information.

  2. Configure the IP addresses that you do not want the scanner to scan.

    See Add an IP address or IP address range to the denylist for more information.

  3. Configure the IP address that you want the scanner to scan.

    See Add an IP address or IP address range to the allowlist for more information.

Physical Scanner Virtual Scanner Risk Dashboard Managed Risk Installation or Configuration User Guide Public

Zuletzt aktualisiert: March 30, 2026

Zurück View Scan Queue Weiter Create a Scan Schedule
Arctic Wolf Help Documentation
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.
Datenschutzrichtlinie Nutzungsbedingungen Cookie-Richtlinie Erklärung zur Barrierefreiheit Informationssicherheit Nachhaltigkeitserklärung