Using the Scan Assistant

The Scan Assistant provides you with a secure alternative for authenticated scans that utilizes elliptic curve asymmetric encryption (ECDSA) and advanced encryption standard (AES) to form a trusted secure channel between the Scan Assistant and the Scan Engine. You can deploy the Scan Assistant with a public certificate in your environment which allows the Scan Engine to receive a private certificate.

The Scan Assistant achieves the same results as a credential scan without the need for administrative credential management and provides accurate, granular vulnerability fingerprinting and assessment for assets. The Scan Assistant allows the Scan Engine to connect directly to an endpoint in order to collect data without the need for additional credentials. A secure connection is created between the Scan Engine and the Scan Assistant by using elliptic curve asymmetric encryption (ECDSA) and advanced encryption standard (AES).

Once installed, the Scan Assistant provides Registry and File System services (Windows) or a Command Execution Service (Linux) on the local asset, and only runs when scans are performed.

The Scan Assistant Workflow

Why should I use the Scan Assistant?

The Scan Assistant provides a more secure way to scan your assets, removes the need for administrative credential management, consumes much fewer resources, and significantly decreases the time to complete for policy scans.

Better Security

The Scan Assistant leverages Transport Layer Security (TLS) with elliptic curve asymmetric encryption (ECDSA) and advanced encryption standard (AES) and digital certificates to create a trusted secure channel between the Scan Engine and the Scan Assistant.

No Credential Management

The Scan Assistant provides the only access needed for you to run an authenticated scan. There is no need for privileged Admin account access to assets. This means that the Scan Assistant can perform scans without the hassle of managing credentials to assets.

You do not need to use SSH, CIFS, WMI or other traditional account-based credentials alongside the Scan Assistant, since the Scan Assistant acts as your credential type. Note that the Scan Engine prioritizes the Scan Assistant over other credential types when it is present.

Efficiency

The Scan Assistant is lightweight and efficient. It consumes minimal memory and CPU resources. Once installed, the Scan Assistant provides Registry and File System (Windows) or Command Execution (Linux) services on the local asset. The Scan Assistant only runs when scans are initiated.

Faster Policy Scans

Due to the large amounts of data being collected, policy scans usually take a while to complete. With the Scan Assistant, policy scan time completion improves vastly.

When Should I use the Scan Assistant?

The Scan Assistant provides an additional tool that Nexpose and InsightVM administrators can leverage to expand and extend enterprise vulnerability coverage. It is complementary to the Insight Agent, and compatible with the InsightVM cloud platform, but does not require cloud connectivity. The Scan Assistant provides an ideal solution for the following vulnerability coverage scenarios:

ScenarioHow the Scan Assistant Helps
Authenticated scan credentials are difficult to administer.The Scan Assistant uses digital certificates instead of traditional administrative credentials.
Need more control over site parameters.The Scan Assistant does not require Internet connectivity.
Concerns about agent resource utilization for mission critical assets.The Scan Assistant is only active during scans initiated by the Scan Engine.
Need granular control over assessment parameters for particular assets.The Scan Assistant responds to specific scan parameters defined by the Console to the Scan Engine.
Need to accelerate completion times for vulnerability and policy scans.Compared to traditional authenticated scans, the Scan Assistant will be faster for vulnerability scans and orders of magnitude faster for policy scans.

Resource Utilization

The Scan Assistant will occupy approximately 20MB in memory. It will consume 0% CPU when idle. CPU utilization can range from 2.5% to 6% when the Scan Assistant is active, for a duration of 60 to 120 seconds while a scan is completed.

Scan Assistant Deployment Overview

Windows

  1. Download the Scan Assistant software (.MSI) and the Checksum (SHA512 file).
  2. Create and deploy X.509 digital certificates, that will be used to establish a trusted connection between the Scan Engine and scanned assets.
  3. Configure and schedule scans for Sites with assets that have the Scan Assistant installed.

A Public Key (PEM) is added with the Scan Assistant software and to all supported target assets as part of the installation. A Private Key(included in a PKCS12 file) is added to the Security Console as a scan credential.

Microsoft Standard Installer (Msiexec.exe) is used to install the Scan Assistant software .MSI and one line PEM file with the /i command line parameter. Additional command line parameters can be seen by running Msiexec.exe, or found in Microsoft’s documentation. This information may prove useful in creating automated installation scripts.

Linux

  1. Download the Scan Assistant packages (.DEB or .RPM) and Checksum (SHA512 files).
  2. Create and deploy X.509 digital certificates, that will be used to establish a trusted connection between the Scan Engine and scanned assets.
  3. Configure and schedule scans for Sites with assets that have the Scan Assistant installed.

A Public Key (PEM) is added with the Scan Assistant software and to all supported target assets as part of the installation. A Private Key (included in a PKCS12 file) is automatically added to the Security Console as a scan credential.

Standard Linux Package Managers for Debian (.DEB) or Red Hat Linux (.RPM) distributions are used to install the Scan Assistant software. Be certain to use the appropriate package for your Linux variant. A one line PEM file automatically generated via the Rapid7 Security Console will be pasted into the Scan Assistant config.json file in each scanned asset. Alternatively, the PEM file may be placed in the same directory as the config.json file.

Linux Scan Assistant Credentials

Existing Windows Scan Assistant credentials may be re-used with the Scan Assistant for Linux. A single set of Scan Assistant credentials can be shared across Windows and Linux assets.

Uninstall the Early Access binary version of Scan Assistant

If you installed the Scan Assistant using binary for the Phase I Early Access version and you would like to use the Scan Assistant package manager version instead, you must first uninstall the binary version.

Linux Scan Assistant Credentials

Existing Windows Scan Assistant credentials may be re-used with the Scan Assistant for Linux. A single set of Scan Assistant credentials can be shared across Windows and Linux assets."

Uninstall the Early Access binary version of Scan Assistant for Linux

If you installed the Scan Assistant using the binary provided for the Early Access version and you want to use the Scan Assistant package manager version instead, you must first uninstall the binary version.

Installing and configuring for Windows

Supported Windows Platforms

The Scan Assistant supports the following platforms.

  • Windows 7
  • Windows 7 SP1
  • Windows 8.1
  • Windows 10
  • Windows 11
  • Windows Server 2008 R2
  • Windows Server 2008 R2 SP1
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022

Task 1: Download the Windows Installer and Checksum

Before setting up the Scan Assistant, you must download the MSI and checksum.

Task 2: Add port to Service Discovery and Asset Discovery

You must add TCP port 21047 to both Service Discovery and Asset Discovery for all scan templates before setting up the Scan Assistant.

Task 3: Generate the Scan Assistant Credentials

You can automatically generate the Scan Assistant credentials in the InsightVM Console. When generating new Scan Assistant credentials, previous credentials are not automatically deleted. You can set up automatic certificate rotation or delete your old credentials.

Do not use Windows credentials with the Scan Assistant

Windows credentials should not be used alongside the Scan Assistant. The Scan Assistant acts as your credential type.

  1. From the Administration tab, under Shared Credentials, click Create.
  2. On the General tab, enter a unique name and description.
  3. On the Account tab, in the Service field, select Scan Assistant.
  4. Select the Generate checkbox. By selecting this checkbox, your scan credentials are automatically generated once the credential is saved.
  5. On the Site Assignment tab, specify what sites can use the credential.
    • To allow all sites to access the credential, select Assign these credentials to all current and future sites.
    • To select a specific set of sites to access the credential, click Select Sites, select the sites you want to allow to use the credential, and click Add Sites.
  6. Click Save. You are redirected back to the Administration page.
  7. Under Shared Credentials, click manage.
  8. Click Edit on your newly created Scan Assistant shared credential.
  9. Copy the automatically generated PEM file.

Task 4: Install the Scan Assistant on Windows

1. Deploy to an asset

Depending on your preferred tool, enter one of the following where PEM is the one-line PEM you generated in the previous step:

  • In the command prompt, navigate to your msi and enter: msiexec /i ScanAssistantInstaller.msi CLIENT_CERTIFICATE="PEM"
  • In PowerShell, navigate to your msi and enter: msiexec /i ScanAssistantInstaller.msi CLIENT_CERTIFICATE="PEM"
2. Verify the installer digital signature

To verify that the digital signature on the Scan Assistant Installer is valid, right-click on the installer and click Properties > Digital Signatures. The name of the signature should be Rapid7 LLC.

The Scan Assistant Installer Digital Signature

Asset Configuration Details

When installed, the Scan Assistant automatically configures the required parameters on the asset. It adds itself as a service that starts automatically and adds itself to the Windows firewall, listening on TCP port 21047. It also adds itself as an event source to the Windows eventlog and supports audit logging when required. When uninstalled, the Scan Assistant removes all changes made to the asset.

The following table shows additional Windows asset configuration.

ItemDetails
Process NameScanAssistant.exe
Default Installation PathC:\Program Files\Rapid7\InsightVM\ScanAssistant
Registry ConfigurationHKLM\SOFTWARE\Rapid7\InsightVM\ScanAssistant
Service Display NameRapid7 Scan Assistant
Service NameR7ScanAssistant
Service Listener Port21047 TCP
Service Registry ConfigurationHKLM\SYSTEM\CurrentControlSet\Services\R7ScanAssistant
Enable Enhanced Application Logging (set value to 1)HKEY_LOCAL_MACHINE\SOFTWARE\Rapid7\InsightVM\ScanAssistant\Debug

Asset deployment Notes

When the Scan Assistant is used, the following configurations and services that may have been required on the target Windows assets to enable traditional credentialed scans are no longer needed:

  • Remote access to an Administrative account
  • Remote access to built-in Windows services
  • Enable the Windows Registry services
  • Enable the WMI service
  • Enable the WinRM service
  • Enable File & Print sharing, or equivalent services

Installing and configuring for Linux

Scan Engine version

Scan Assistant for Linux requires your Scan Engine to be at 6.6.153 or higher.

Supported Linux Platforms

The Scan Assistant for Linux should install on any Linux distribution that supports Debian (.DEB), Red Hat (.RPM) Package Managers, systemd or upstart Service Managers.

Linux distributions that have been tested are listed in the table below. Note that the Scan Assistant for Linux may also install on other Linux distributions that meet the criteria listed above.

Linux distributions by service manager and package manager

Linux DistributionService ManagerPackage Manager
Amazon Linux 2 (64-bit)systemd.RPM
Debian GNU/Linux 6 (64-bit)systemd.DEB
Fedora 36 Server (64-bit)systemd.RPM
Red Hat Enterprise Linux 6.5 (64-bit)upstart.RPM
Red Hat Enterprise Linux 8 (64-bit)systemd.RPM
SUSE openSUSE (64-bit)systemd.RPM
Ubuntu Linux 16.04 (64-bit)upstart.DEB
Ubuntu linux 20.04 (64-bit)systemd.DEB
Ubuntu linux 22.04 (64-bit)systemd.DEB

Task 1: Download Scan Assistant for Linux Packages(s) and Checksum(s)

Before setting up the Scan Assistant, you must download the appropriate package and checksum for your Linux distribution and package manager.

Key file locations

  • The Scan Assistant binary can be found at the following path: /usr/sbin/ScanAssistant.
  • The Scan Assistant configuration file (config.json) and asset one-line PEM file will reside in: /etc/rapid7/ScanAssistant. The config.json file will be automatically created as part of the installation.

Generate Scan Assistant credentials

The Scan Assistant leverages X.509 digital certificates, to establish a trusted connection between the Scan Engine and scanned assets.

Scan Assistant credentials can be generated automatically from the Security Console Shared Credentials interface. You can find more information on generating Scan Assistant credentials here. Also, you must copy the automatically generated PEM file for use with your Linux asset installation.

PEM File

This file is the PEM formatted certificate referenced below.

Task 2: Install the package

Scan Assistant packages are available for Debian (.DEB) and Red Hat (RPM) based distributions.

Linux configuration files

The Scan Assistant for Linux uses a configuration file called config.json. This file contains a number of parameters that are required for the Scan Assistant to function.

  • The config.json contains a field called PackageManager which specifies the package manager to be used on the asset (.DEB or .RPM). This means that a single config.json cannot be used enterprise wide for Scan Assistant for Linux installations.

  • There are two options for the initial location of the PEM file on the asset. It can be pasted into the config.json, or it can be contained in a separate file named scan-assistant.pem, located in the same directory as the config.json (/etc/rapid7/ScanAssistant).

.DEB package installation

Debian based systems use the dpkg command to install .DEB packages.

  1. At a command prompt (in Linux also called Terminal Window) issue the following command from the directory where the Scan Assistant package is located: sudo dpkg -i R7ScanAssistant_amd64.deb.

  2. Verify the following lines are in the output:

    1
    Service action: "install"
    2
    Service action: complete
    3
    Service action: "start"
    4
    Service action: complete

If you are unable to see the output, the Scan Assistant may be installed but it is not running. Contact Support to receive assistance with this issue.

  1. From a terminal window, edit the configuration file located at /etc/rapid7/ScanAssistant/config.json. The one line PEM file that was created on the Security Console can be pasted into the config.json between the quotations in the ClientCertificate field.

The client certificate may optionally appear as a separate PEM file in the same directory. When using this method the PEM file must be named scan-assistant.pem. Note that if the Scan Template automatic certificate update feature is used, the PEM file will be automatically inserted into the config.json from that point forward. The external scan-assistant.pem will remain in place as a previously used credential.

Config.json

1
{
2
"ClientCertificate": "",
3
"ResponseTimeout": 300,
4
"Debug": false,
5
"PackageManager": "deb"
6
}
  1. Methods to verify the installation:

    • List installed packages
      • Enter: Enter sudo dpkg-query -l | grep r7ScanAssistant
    • Check for service in memory status: ps -ef | grep ScanAssistant

.RPM package installation

Red Hat-based systems use the rpm command to install .RPM packages

  1. In the command prompt install sudo rpm -ivh R7ScanAssistant_amd64.rpm.

  2. Verify the following lines are in the output:

    1
    Service action: "install"
    2
    Service action: complete
    3
    Service action: "start"
    4
    Service action: complete

If you are unable to see the output, the Scan Assistant may be installed but it is not running. Contact Support to receive assistance with this issue.

  1. From a terminal window, edit the configuration file located at /etc/rapid7/ScanAssistant/config.json. The one line PEM file that was created on the Security Console can be pasted into the config.json between the quotations in the ClientCertificate field.

The client certificate may optionally appear as a separate PEM file in the same directory. When using this method the PEM file must be named scan-assistant.pem. Note that if the Scan Template automatic certificate update feature is used, the PEM file will be automatically inserted into the config.json from that point forward. The external scan-assistant.pem will remain in place as a previously used credential.

Config.json

1
{
2
"ClientCertificate": "",
3
"ResponseTimeout": 300,
4
"Debug": false,
5
"PackageManager": "rpm"
6
}
  1. Methods to verify the installation:

    • List installed packages
      • Enter: rpm -q R7ScanAssistant_amd64 -i
    • Check for service in memory status: ps -ef | grep ScanAssistant

Example output of verifying installation

1
```
2
json
3
4
Name: R7ScanAssistant
5
Epoch: 0
6
Version: 1.2.1
7
Release: 1
8
Architecture: x86_64
9
Install Date: Mon 15 Aug 2022 05:31:15 PM UTC
10
Group:
11
Size: 9151866
12
License:
13
Signature: (none)
14
Source RPM: R7ScanAssistant.src.rpm
15
Build Date: Thu 11 Aug 2022 10:21:24 PM UTC
16
Build Host: AUS-MBP-6346
17
Relocations: (not relocatable)
18
Packager: Rapid7
19
Vendor: Rapid7
20
URL:
21
Summary: Rapid7 InsightVM Scan Assistant
22
Description: Rapid7 InsightVM Scan Assistant
23
```

Automatic Certificate Rotation

In the Scan Assistant template, you can automatically rotate your Scan Assistant certificate. When you enable certificate rotation, InsightVM automatically attempts to update the Scan Assistant to use the available credential with the latest expiration date.

You can not explicitly set the expiration date for certificates that are automatically generated from the Security Console. The default validity period for certificates is three years, so the most recent certificate added will have the longest validity period. To enable the certificate rotation, you will need to create a new certificate pair from the Security Console according to your IT Security policy for digital certificate or credential rotation.

Authentication is required

Authentication is required for successful certificate updates.

Do not remove the previous credential

To avoid a lock out, do not remove the previous credential until the certificate rotation is complete.

Rapid7 recommends deleting the oldest certificate every 3rd new certificate. Keep in mind that this recommendation is not necessarily the timeframe but in accordance with your internal certificate rotation policy. The frequency of rotation is usually set by your IT Security Policy. You may choose to rotate the certificates in accordance with your Security Policy before they expire.

Certificate Rotation Workflow

Scan Assistant Software Updates

When you enable automatic updates, InsightVM updates the Scan Assistant with the latest installation, when available. Automatic updates are available for the Scan Assistant for Windows versions 1.1.0 and Linux versions 6.6.153. Automatic updates are also available for later versions of Windows and Linux.

  1. Select the Administration tab
  2. Under Templates, click Create.
  3. On the Scan Assistant tab select the Rotate Certificates checkbox, to automatically rotate your Scan Assistant certificates.
  4. Select the Apply Updates checkbox, to automatically apply the latest updates.
  5. Click Save.

For optimal scan performance with the Scan Assistant, Rapid7 recommends selecting either the Automatic Certificate Rotation or the Scan Assistant Software Updates feature, but not both in the same scan template. Enabling both features in the same scan template affects the scan performance issues when a Scan Assistant update or Credential rotation occurs.

Uninstall the Scan Assistant from a Windows asset

Command line

You can uninstall the Scan Assistant from a Windows asset by utilizing the command line.

The Windows Scan Assistant ships as an .msi file and uses the standard Microsoft Windows installer, msiexec.exe. Refer to Microsoft’s documentation to view all the listed command line options. Also, you can see the command line options by running msiexec from a CMD prompt on a Windows Machine.

Microsoft Windows Installer

UI

You can also uninstall the Scan Assistant from a Windows asset from Windows Explorer and the add or remove programs applet.

Windows Explorer

If you are at the keyboard of the Windows asset, you can use Windows Explorer to uninstall.

  1. Navigate to ScanAssistantInstaller.msi.

The location of the ScanAssistantInstaller will be based on the folder or directory you chose to place it in.

  1. Right click on the .msi and select Uninstall.

Programs applet

You can uninstall the Scan Assistant from the add or remove programs applet. On Windows 10, if you search for Add in the Windows search bar, you will see the add or remove programs applet.

Uninstall the Scan Assistant from a Linux asset

.DEB packages

  1. From a terminal window issue the following command: sudo dpkg -r r7ScanAssistant

  2. Verify the following lines in the command output:

    1
    Service action: "stop"
    2
    Service action: complete
    3
    Service action: "uninstall"
    4
    Service action: complete

.RPM packages

  1. From a terminal window issue the following command: rpm -e R7ScanAssistant

  2. Verify the following lines in the command output:

    1
    Service action: "stop"
    2
    Service action: complete
    3
    Service action: "uninstall"
    4
    Service action: complete

Mass deployment

For mass deployments of the Scan Assistant for Linux a unique config.json must be created for groups of assets using each package manager (.DEB or .RPM).

The following tools may be used to automate mass installations of the Scan Assistant:

  • Microsoft SCCM (System Center Configuration Manager
  • Microsoft GPO (Group Policy Orchestrator)
  • HCL BigFix
  • Red Hat Ansible

Documentation for each tool set is available from the respective vendor.

Frequently Asked Questions

Can I manually generate the Scan Assistant certificate?

Yes. You can manually generate the Scan Assistant certificate on Linux or Windows.

Create the Scan Assistant certificate on Linux
1. Create the keys
  1. Open the command prompt.
  2. Create the private key.
    • For an ECDSA key, enter: openssl ecparam -out scan-assistant.key -name secp384r1 -genkey
    • For an RSA key, enter: openssl genrsa -out scan-assistant.key 3072
  3. Create the public key. Enter: openssl req -new -nodes -x509 -out scan-assistant.pem -key scan-assistant.key -days 3650 -subj "/O=/OU=/CN=scan.assistant.rapid7.com/emailAddress="
  4. Wrap the keys. Enter: openssl pkcs12 -export -inkey scan-assistant.key -in scan-assistant.pem -out scan-assistant.p12
  5. Add a password to further encrypt your file.
2. Add credentials to the console
  1. From your InsightVM console, click on the site that you want to enable the Scan Assistant.
  2. Click Authentication > Add Credentials.
  3. Add a name and description.
  4. Click Account.
  5. In the Service Type field, select Scan Assistant.
  6. In the PKCS#12 File field, select the p12 file.
  7. Enter your file password.
  8. Click Create.
  9. Click Save.
3. Create a single-line PEM
  1. In the command prompt, enter: cat scan-assistant.pem | xargs
  2. Copy the one-line PEM.
Create the Scan Assistant certificate on Windows
1. Generate a self-signed certificate
  1. In PowerShell, create the private key.
    • For an ECDSA key, enter: New-SelfSignedCertificate -Subject "CN=scan.assistant.rapid7.com/emailAddress=" -KeyAlgorithm ECDSA_secp384r1
    • For an RSA key, enter: New-SelfSignedCertificate -Subject "CN=scan.assistant.rapid7.com/emailAddress=" -KeyAlgorithm RSA -KeyLength 3072

Add dates to your certificate

If you want to specify the start and expiration dates of your certificate, add any of the following to your key in combination with -NotAfter and -NotBefore: *(Get-Date).AddDays

  • (Get-Date).AddMonths

    • (Get-Date).AddYears

    For example, New-SelfSignedCertificate -Subject "CN=scan.assistant.rapid7.com/emailAddress=" -KeyAlgorithm RSA -KeyLength 3072 -NotBefore (Get-Date).AddMonths(1) -NotAfter (Get-Date).AddMonths(121).

  1. Copy the generated thumbprint.
2. Export the PFX file

In PowerShell, run as administrator and enter:

1
$mypassword = ConvertTo-SecureString -String "PASSWORD" -Force -AsPlainText
2
Export-PfxCertificate -Cert Cert:\LocalMachine\My\THUMBPRINT -FilePath scan-assistant.pfx -Password $mypassword

Where PASSWORD is your password for the PFX file and THUMBPRINT is the thumbprint you created in step 1.

3. Add credentials to the console

Do not use Windows credentials with the Scan Assistant

Windows credentials should not be used alongside the Scan Assistant. The Scan Assistant acts as your ‘credential type’. Using both at the same time negates the Scan Assistant’s benefits.

  1. From your InsightVM console, click on the site that you want to enable the Scan Assistant.
  2. Click Authentication > Add Credentials.
  3. Add a name and description.
  4. Click Account.
  5. In the Service Type field, select Scan Assistant.
  6. In the PKCS#12 File field, select the PFX file.
  7. Enter your file password.
  8. Click Create.
  9. Click Save.
4. Extract the one-line public certificate (PEM file)
  1. In PowerShell, run as administrator and enter:
1
$oMachineCert=Get-Item Cert:\LocalMachine\My\THUMBPRINT
2
$InsertLineBreaks=0
3
$oPem=new-object System.Text.StringBuilder
4
$oPem.Append("-----BEGIN CERTIFICATE----- ")
5
$oPem.Append([System.Convert]::ToBase64String($oMachineCert.RawData, $InsertLineBreaks))
6
$oPem.Append(" -----END CERTIFICATE-----")
7
$oPem.ToString()

Where THUMBPRINT is the thumbprint you generated in step 1.

  1. Copy the one-line PEM.
How can I delete a certificate on Windows?

If you need to delete a certificate from the Windows certificate store, run the following in PowerShell:

1
Remove-Item -Path cert:\LocalMachine\My\581C1CA18731790790CF7392DC3510CFA5382BBD -DeleteKey
2
3
Remove-Item -Path cert:\LocalMachine\My\THUMBPRINT -DeleteKey
How can I verify that the Scan Assistant is present and running on a Windows asset?

There are multiple ways to verify that the Scan Assistant is successfully installed on an asset.

Verifying the Scan Assistant is Listed as a Running Process

The Scan Assistant should be listed as a running process in the Task Manager.

  1. Open the Task Manager.
  2. Click on the Processes tab.
  3. Under the Name column click on the Scan Assistant dropdown.
    • You should see the Rapid7 Scan Assistant listed under the Scan Assistant dropdown.
Checking for the Rapid7 Scan Assistant in the Windows Services

The Rapid7 Scan Assistant should be listed in the Windows Services.

  1. Open Services > Extended tab.
  2. Under the Name column look for the Rapid7 Scan Assistant.
Viewing the Scan Assistant Public Certificate in the Windows Registry

The Scan Assistant public certificate should be viewable in the Windows Registry. Also, Debug level logging for the Scan Assistant is enabled by setting the Debug registry value at 1.

  1. Open the Registry Editor.
  2. Click on Software > Rapid7 > InsightVm.
  3. Open the ScanAssistant folder.
  4. In the Name column verify the Client Certificate is listed.
Validate whether an error is recorded in the Windows Application Event Log

If the client certificate is unable to load, an error is recorded in the Windows Application Event Log.

  1. Open the Event Viewer.
  2. Click the Windows Log Folder dropdown.
  3. Select Applications.
  4. In the Level column verify if an Error is listed.
Utilizing the Windows netstat-a command

The Windows netstat-a command can be issued from the Command Prompt to verify that the Scan Assistant is listening on TCP port 21407.

  1. Open the Command Prompt.
  2. Enter the netstat-a command:
    • \>netstat -a
What if I am unable to verify that the Scan Assistant is Installed

If you cant not verify that the Scan Assistant is successfully installed, ensure that you followed the installation steps correctly or contact your CSM for support.

How can I verify that the Network Scans can complete successfully?

There are two methods to verify that the Network Scans are able to successfully complete.

  • Check that all Scan Templates being used to assess assets with the Scan Assistant include TCP port 21047 for both Service Discovery and Asset Discovery.

  • Check that any network firewalls that may reside between Scan Engines and assets with the Scan Assistant installed have been configured to allow TCP port 21047.