Overview of all Cyrisma Scan Types
Last updated: December 19, 2025
Cyrisma provides multiple types of scans designed to identify security risk across endpoints, networks, cloud services, identity platforms, and externally exposed assets. Each scan serves a specific purpose and operates using either a locally installed scan agent, a Cyrisma cloud-based service, or a browser extension, depending on the use case.
This article explains what types of scansexist, how they execute, what they require, and what data they collect, without relying on user interface workflows.
How Cyrisma Scans Execute
Cyrisma uses a hybrid scanning model:
User-installed scan agents perform local and internal scanning.
Cyrisma cloud agents perform external, cloud, and internet-facing scans.
Browser extensions are used for Chromebook scanning.
Certain scans operate agentless, depending on scope and data source.
All communication is outbound and encrypted. No inbound connections to customer environments are required.
Scan Types
1. Network Discovery
Purpose: Identify devices and services present on a network.
Execution: User-installed scan agent
Windows sensor required: Yes
Credentials: Required for full accuracy when scanning remote systems
Data collected:
Discovered IP addresses and hostnames
Open TCP/UDP ports
Operating system fingerprinting
Service and protocol information
SNMP results (if available)
Notes:
Results depend heavily on network permissions and credential access.
2. Data Sensitivity Scans (Local / CIFS / SMB)
Purpose: Identify sensitive data stored on local disks or network file shares.
Execution: User-installed scan agent
Credentials: Required for remote shares
Data collected:
Files containing sensitive data patterns
Detected passwords (displayed to validate false positives)
Masked credit card numbers for verification
Notes:
These scans may be resource-intensive depending on scan scope.
3. Microsoft Cloud Data Scans (M365)
Purpose: Identify sensitive data stored in Microsoft 365 services.
Execution: Cyrisma cloud agent or optional local agent
Credentials: Microsoft 365 integration required
Data collected from:
Exchange Online (email)
OneDrive
SharePoint
4. Google Cloud Data Scans
Purpose: Identify sensitive data stored in Google Workspace services.
Execution: Cyrisma cloud agent or optional local agent
Credentials: Google Workspace integration required
Data collected from:
Gmail
Google Drive
5. Internal Authenticated Vulnerability Scans
Purpose: Identify vulnerabilities using authenticated access to systems.
Execution: User-installed scan agent
Windows sensor required: Yes (for remote targets)
Credentials: Required for remote systems; not required when scanning the local host
Data collected:
Installed software and version information
Patch levels and OS hotfixes
Running services and processes
System configuration and security posture
CVE-based vulnerability findings
6. Internal Unauthenticated Vulnerability Scans
Purpose: Simulate what an unauthenticated attacker can observe.
Execution: User-installed scan agent
Windows sensor required: Yes (for remote targets)
Credentials: Not required
Data collected:
Open TCP/UDP ports
Service banners and protocol versions
Operating system fingerprint guesses
SSL/TLS configuration and certificate data
Publicly exposed services and resources
Notes:
Results are intentionally limited compared to authenticated scans.
7. External IP Vulnerability Scans
Purpose: Identify vulnerabilities on internet-facing infrastructure.
Execution: Cyrisma external cloud agent
Agent required: No
Credentials: Not required
Data collected:
Exposed ports and services
Publicly accessible vulnerabilities
SSL/TLS and certificate issues
Only externally visible assets are evaluated.
8. External Web Application Vulnerability Scans (WAS)
Purpose: Identify vulnerabilities in publicly accessible web applications.
Execution: Cyrisma cloud agent
Credentials: Not authenticated by default
Data collected:
Web vulnerabilities such as SQL injection and cross-site scripting
Publicly accessible data already exposed to the internet
Private or authenticated content is not accessed.
9. Chromebook Vulnerability Scans
Purpose: Assess Chromebook environments.
Execution: Browser extension
Agent required: No
Data collected:
Device and browser security posture information
10. Secure Baseline Scans
Purpose: Evaluate system configuration against defined security benchmarks.
Execution: User-installed scan agent
Windows sensor required: Yes (for remote targets)
Credentials: Required for remote systems
Data collected:
System and security configuration settings
Security benchmark alignment results (for example, CIS baselines)
11. Dark Web Scanning
Purpose: Identify exposed credentials and data associated with the organization.
Execution: Cyrisma internal service
Agent required: No
Data collected:
Exposed credentials and related indicators
12. Active Directory Monitoring
Purpose: Monitor identity and directory security posture.
On-Premise AD Monitor
Requires a scan agent installed on a domain controller
Entra ID Monitor
Uses a Cyrisma cloud agent or optional local agent
13. Microsoft Secure Score
Purpose: Evaluate Microsoft security posture and Secure Score metrics.
Execution: Cyrisma cloud service
Agent required: No
Data collected:
Microsoft Secure Score metrics and posture indicators
Credential Usage Summary
Local scans on the host where the agent is installed do not require credentials.
Remote scans require credentials in NT / NetBIOS format.
Cloud data scans require the appropriate platform integration.
Unauthenticated scans provide limited visibility by design.