Nmap Remediation Options
You define the settings for an Nmap scan by creating an Nmap remediation. An Nmap remediation can be used as a response in a correlation policy, run on demand, or scheduled to run at a specific time.
Note that Nmap-supplied server and operating system data remain static until you run another Nmap scan. If you plan to scan a host for operating system and server data using Nmap, you may want to set up regularly scheduled scans to keep any Nmap-supplied operating system and server data up-to-date.
The following table explains the options configurable in Nmap remediations.
|
Option |
Description |
Corresponding Nmap Option |
|---|---|---|
|
Scan Which Address(es) From Event? |
When you use an Nmap scan as a response to a correlation rule, select one of the following options to control which address in the event is scanned, that of the source host, the destination host, or both:
|
N/A |
|
Scan Types |
Select how Nmap scans ports:
|
TCP Syn:
TCP Connect:
TCP ACK:
TCP Window:
TCP Maimon:
|
|
Scan for UDP ports |
Enable to scan UDP ports in addition to TCP ports. Note that scanning UDP ports may be time-consuming, so avoid using this option if you want to scan quickly. |
|
|
Use Port From Event |
If you plan to use the remediation as a response in a correlation policy, enable to cause the remediation to scan only the port specified in the event that triggers the correlation response.
You can also control whether Nmap collects information about operating system and server information. Enable the Use Port From Event option to scan the port associated with the new server. |
N/A |
|
Scan from reporting detection engine |
Enable to scan a host from the appliance where the detection engine that reported the host resides.
|
N/A |
|
Fast Port Scan |
Enable to scan only the TCP ports listed in the
|
|
|
Port Ranges and Scan Order |
Set the specific ports you want to scan, using Nmap port specification syntax, and the order you want to scan them. Note that you cannot use this option with the Fast Port Scan option. |
|
|
Probe open ports for vendor and version information |
Enable to detect server vendor and version information. If you probe open ports for server vendor and version information, Nmap obtains server data that it uses to identify servers. It then replaces the Cisco server data for that server.
|
|
|
Service Version Intensity |
Select the intensity of Nmap probes for service versions.
|
|
|
Detect Operating System |
Enable to detect operating system information for the host. If you configure detection of the operating system for a host, Nmap scans the host and uses the results to create a rating for each operating system that reflects the likelihood that the operating system is running on the host.
|
|
|
Treat All Hosts As Online |
Enable to skip the host discovery process and run a port scan on every host in the target range. Note that when you enable this option, Nmap ignores settings for Host Discovery Method and Host Discovery Port List.
|
|
|
Host Discovery Method |
Select to perform host discovery for all hosts in the target range, over the ports listed in the Host Discovery Port List, or if no ports are listed, over the default ports for that host discovery method. Note that if you also enabled Treat All Hosts As Online, however, the Host Discovery Method option has no effect and host discovery is not performed. Select the method to be used when Nmap tests to see if a host is present and available:
|
TCP SYN:
TCP ACK:
UDP:
|
|
Host Discovery Port List |
Specify a customized list of ports, separated by commas, that you want to scan when doing host discovery. |
port list for host discovery method |
|
Default NSE Scripts |
Enable to run the default set of Nmap scripts for host discovery and server and operating system and vulnerability detection. See https://nmap.org/nsedoc/categories/default.html for the list of default scripts.
|
|
|
Timing Template |
Select the timing of the scan process; the higher the number you select, the faster and less comprehensive the scan. |
0:
1:
2:
3:
4:
5:
|