Number of checks included with each license + plan
License | Scanning engine(s)
| Number of checks | What's covered |
OpenVAS
(Standard with Essential plan) | ~17,000 |
| |
Tenable
(Standard with Pro, Premium, Vanguard plan)
| ~140,000 |
| |
Tenable + ZAP
(Available to purchase on any plan)
| ~140,000 + 69 |
|
Types of checks:
Essential, Pro, Premium Vanguard:
Unintentionally exposed systems
Checks for software and services which are not recommended to be exposed to the internetInformation Leakage
Checks for information leakage which could be used by hackers to mount further attacksEncryption weaknesses
Checks for weaknesses in SSL/TLS implementationsMisconfigurations & common mistakes
Checks for misconfigurations, security best-practices, and common mistakes such as exposing code repositoriesRemote vulnerable Software and missing patches
Checks (from an external perspective) for software with publicly known vulnerabilities
Pro, Premium, Vanguard
These plans also include internal scanning (via an agent) for Linux, Windows and MacOS devices. Which offers more comprehensive checks as it is has more privileged access to the machine. Some of the things we check you for include:
Local misconfigurations & common mistakes
No matter how secure the software package is, it can still be configured in an insecure manner - for example leaving default passwords setup; inadvertently leaving admin pages exposed; and not enabling encryption.
Vulnerable software packages & missing patches
Checks your internal targets for vulnerable versions of software packages, frameworks and components, including OS patches, software updates and missing server packages.
Application licenses cover:
OS command injection
Cross-site scripting (XSS); persistent/stored, reflected and DOM-based XSS
SQL injection; against multiple types of databases
NoSQL injection; specifically against MongoDB
LDAP injection
XPath injection
Server-side includes
Server-side code injection
Java serialisation weaknesses
Buffer and integer overflows
[For a more detailed explanation of the features included in each plan head to this article: Which service is right for me?]
Where can I see the full list of checks you run?
If you have access to the portal, you can see exactly what we test your for. Just head to the dashboard and click Checks available (middle at the top).
Here you can see all the checks your targets will be evaluated against; with the option to filter by CVSS Rating, Check Type (internal, external, application), or search by CVE or Check Name:
Clicking on any check will take you through to the Check's Detail page, where you can find information such as date of publication; scanning engine; CVSS rating; check type (internal, external, authenticated) and CVE.
You can also filter the list by Passed / Failed and organise by scan date or address.
You'll also see which of your targets have been checked for that vulnerability, which weren't; the last known status [Failed or Passed]; and the last scan date.
FAQs
Do all checks get executed all the time?
All checks are enabled, but this does not mean that all checks will be executed against every service that your systems has listening on the internet. Instead, vulnerability scanners will 'fingerprint' the service running on that port and execute checks for that service only (there’s little value in executing a check for a different type of service other than the one that’s listening on your system).
Can I export a list of all the checks?
Yes, absolutely! Just head to the Checks page and hit 'Export to CSV':