Credentialed Scanning section

On the Scanner Config page, the Credentialed Scanning section displays the Credentialed Scanning table.

For more information about requirements and configuration, see Configure credentialed scanning.

To change how the information displays in the Credentialed Scanning table, do any of these actions:

  • To set the number of rows that appear on a page, in the Show x Entries list, select a value.
  • To sort data by a specific column, click the column heading.
  • To view specific information, in the Search bar, enter keywords.

The Credentialed Scanning table has these columns:

Column

Description

Name

The name of the credential that you configured.

Type

The type of credential. Values include:
  • Username/Password — You will provide the username and password of the target host(s). Windows requires the username in the format domain\username
  • Username/SSH Key — You will provide the username and SSH key of the target host(s). Using SSH key is supported for Linux and Unix-like targets.

Hosts

The hosts that apply to this credentialed scan.

Description

A description of the scan. For example, SSH key pair to host A.

Modify

Use this column to modify your credentialed scan:
  • Click Edit to edit the credentialed scan.
  • Click Delete to delete the credentialed scan.