home home
Autres sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Demander une démo Documentation interne
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentification
  • Capteurs, scanners et collecteurs de logs
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Développeurs et OEM
  • Mises à jour des produits
  • Informations supplémentaires sur les produits et services
  • Legacy Risk Dashboard
  • Analyses legacy
  • English
  • 日本語
  • Deutsch
  • Français
Connexion
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentification
  • Capteurs, scanners et collecteurs de logs
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Développeurs et OEM
  • Mises à jour des produits
  • Informations supplémentaires sur les produits et services
  • Legacy Risk Dashboard
  • Analyses legacy
  • English
  • 日本語
  • Deutsch
  • Français
Connexion

Legacy Risk Dashboard

Legacy Risk Dashboard
  • Risk Dashboard
    • Requirements
    • Access
    • Getting Started Video
    • Routine Tasks
    • Overview Page
      • View Risk Metrics
      • View Risk Score Trends
      • Evaluate Current Risk Score
      • Download an Executive Summary
      • Download a Risk Assessment
      • Download Risk Score Trends
      • Download Asset Class Health
      • Download Asset Health
    • Management Plan Page
      • Plan section
      • View a Plan
      • View Unassigned Risks
      • Create a Plan
      • Move Risks Between Plans
      • Edit the Plan Timeline Scale
      • Close a Plan
      • Download Unassigned Risks Table Data
    • Risks Page
      • Filters Section
      • Default Filters
      • Risk States
      • Risk Statuses
      • Risks and Unassigned Risks Sections
      • Risk Information Pane
      • Risk State and Status Lifecycles
      • Rescan Assets with Risks
      • Review Active Risks
      • Review Inactive Risks
      • Review Mitigated Risks
      • Review Risks that Failed Validation
      • Review Agent Debug Scans
      • View Risks by Due Date
      • Edit State of Inactive Risks
      • Edit Risks
      • Run an Agent Debug Scan
      • Accept a Vulnerability
      • Assign User and Due Date
      • Unassign User and Due Date
      • Download Remediation Report
      • Download Risks table data
    • Assets Page
      • Asset Catalog Section
      • Asset Filters
      • Review Assets
      • View an Asset Profile
      • Create an Asset Tag
      • Edit Assets
      • Edit Asset Tags
      • Edit Device Name
      • Edit Category
      • Edit Criticality
      • Rescan Assets
      • Reset Sensor Details
      • Remove an Asset
      • Download Asset Catalog Data
    • Agent Page
      • Target Group Overview
      • View Risk Charts
      • View Agent Risks
      • View Agent Scan Details
      • View Agent Audits
      • Enable an Agent Scan Schedule
      • Stop an Agent Scan
    • EVA Page
      • EVA Overview
      • Target Group Overview Section
      • Target Group to Risk Severity Section
      • Target Group to Risk Severity Filters
      • Risks by Target Group Section
      • Filter Target Group by Tags
      • Stop Active and Scheduled EVA Scans
      • Download a Target Group to Risk Severity Chart
    • User Config Page
    • Scanner Config Page
      • IVA Overview
      • Scanner Configuration Section
      • Scanning Schedule Section
      • Credentialed Scanning Section
      • Configure Credentialed Scanning
        • VMware ESXi
        • Linux
        • Windows
      • Scanning Queue Table
      • View Scanner Configuration
      • View Scan Queue
      • Configure a Scanner
      • Create a Scan Schedule
      • Add an IP to the Allowlist
      • Add an IP to the Denylist
      • Enable Brute Force Scanning
      • Brute Force Scanning Username Checks
      • Enable CGI Scanning
      • Enable Only Ping the Target Mode
      • Enable a Scan Schedule
      • Edit a Scan Schedule
      • Stop Scans
      • Disable Brute Force Scanning
      • Disable CGI Scanning
      • Disable a Scan
      • Remove a Scan Schedule
      • Verify that IVA Rescan is Running
      • Verify Scanner Health
    • Scanner Console Page
    • Tools
    • Troubleshoot
Accueil ▸ Legacy Risk Dashboard ▸ Risk Dashboard ▸ Scanner Config Page
Partager cette page
  • LinkedIn
  • X
  • Facebook
  • Email

Configure a scanner

  1. Create a scanner schedule to configure the IP addresses or networks of the targets to scan, the scanning type, and the scan priority.

    See Create a new scan schedule for more information.

  2. Configure the IP addresses that you do not want the scanner to scan.

    See Add an IP address or IP address range to the denylist for more information.

  3. Configure the IP address that you want the scanner to scan.

    See Add an IP address or IP address range to the allowlist for more information.

Physical Scanner Virtual Scanner Risk Dashboard Managed Risk Installation or Configuration User Guide Public

Dernière mise à jour : March 30, 2026

Précédent View Scan Queue Suivant Create a Scan Schedule

Explorer les sujets

Aurora Endpoint Security Managed Detection and Response (MDR) Managed Risk Managed Security Awareness (MA) Incident Readiness and Response Arctic Wolf Unified Portal MSP Portal Authentification Capteurs, scanners et collecteurs de logs Arctic Wolf Agent Onboarding Portal Active Response, Log Forwarding, and Security Monitoring Active Directory Cloud Security Posture Management (CSPM) IT Service Management (ITSM) Développeurs et OEM Mises à jour des produits Informations supplémentaires sur les produits et services Legacy Risk Dashboard Analyses legacy
Arctic Wolf Help Documentation
Politique de confidentialité
Conditions d'utilisation
Politique relative aux cookies
Déclaration d'accessibilité
Sécurité de l'information
Déclaration de développement durable
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.