home home
Other Sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo Internal Documentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
Sign In
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo
Internal Documentation
Sign In

Legacy Risk Dashboard

Legacy Risk Dashboard
  • Risk Dashboard
    • Requirements
    • Access
    • Getting Started Video
    • Routine Tasks
    • Overview Page
    • Management Plan Page
    • Risks Page
    • Assets Page
    • Agent Page
    • EVA Page
    • User Config Page
    • Scanner Config Page
      • IVA Overview
      • Scanner Configuration Section
      • Scanning Schedule Section
      • Credentialed Scanning Section
      • Configure Credentialed Scanning
      • Scanning Queue Table
      • View Scanner Configuration
      • View Scan Queue
      • Configure a Scanner
      • Create a Scan Schedule
      • Add an IP to the Allowlist
      • Add an IP to the Denylist
      • Enable Brute Force Scanning
      • Brute Force Scanning Username Checks
      • Enable CGI Scanning
      • Enable Only Ping the Target Mode
      • Enable a Scan Schedule
      • Edit a Scan Schedule
      • Stop Scans
      • Disable Brute Force Scanning
      • Disable CGI Scanning
      • Disable a Scan
      • Remove a Scan Schedule
      • Verify that IVA Rescan is Running
      • Verify Scanner Health
    • Scanner Console Page
    • Tools
    • Troubleshoot
Home ▸ Legacy Risk Dashboard ▸ Risk Dashboard ▸ Scanner Config Page
Share this page
  • LinkedIn
  • X
  • Facebook
  • Email

Configure a scanner

  1. Create a scanner schedule to configure the IP addresses or networks of the targets to scan, the scanning type, and the scan priority.

    See Create a new scan schedule for more information.

  2. Configure the IP addresses that you do not want the scanner to scan.

    See Add an IP address or IP address range to the denylist for more information.

  3. Configure the IP address that you want the scanner to scan.

    See Add an IP address or IP address range to the allowlist for more information.

Physical Scanner Virtual Scanner Risk Dashboard Managed Risk Installation or Configuration User Guide Public

Last updated: March 30, 2026

Previous View Scan Queue Next Create a Scan Schedule
Arctic Wolf Help Documentation
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.
Privacy Policy Terms of Use Cookie Policy Accessibility Statement Information Security Sustainability Statement