Scan Fails Due to Target or Resource Constraints

Last updated: December 23, 2025

This article explains how to diagnose and resolve scan failures caused by target availability issues, system resource limitations, or execution failures during Secure Baseline scans and Internal Authenticated Vulnerability scans.


Symptoms

  • Scan target fails or is skipped

  • Scan does not complete successfully

  • Scan terminates before completion

  • One or more of the following errors appear:

    • Scan Target Timeout

    • Not Enough Memory

    • Missing Java Files

    • Inaccessible OVAL File

    • No ARF File


Error Types and Applicable Scan Types

Error

Applies To

Scan Target Timeout

Secure Baseline scans, Internal Authenticated Vulnerability scans

Not Enough Memory

Internal Authenticated Vulnerability scans

Missing Java Files

Internal Authenticated Vulnerability scans, Secure Baseline scans

Inaccessible OVAL File

Internal Authenticated Vulnerability scans

No ARF File

Internal Authenticated Vulnerability scans


Common Causes

  • Target machine is offline or not checking in at scan time

  • Insufficient system memory on the scanning agent

  • Java files required for scanning are blocked or unavailable

  • Network connectivity issues prevent access to vulnerability databases

  • Insufficient disk space on the target machine

  • PowerShell execution failures during scan execution

  • Scan execution interrupted due to timeouts or I/O errors


Diagnostic Steps

Follow the steps below in order. Do not skip steps.


1. Verify Target Availability

(Scan Target Timeout)

Applies to: Secure Baseline scans, Internal Authenticated Vulnerability scans

What to check

  • Confirm the target machine is powered on

  • Ensure the machine is connected to the network

  • Verify the target is checking in with Cyrisma

If the target is offline during scan execution, the scan may time out or be skipped.


2. Check System Memory Availability

(Not Enough Memory)

Applies to: Internal Authenticated Vulnerability scans

What to check

  • Ensure at least 1024 MB (1 GB) of available memory is present on the scanning agent

Insufficient memory can cause the scan to terminate before completion.


3. Verify Java File Availability

(Missing Java Files)

Applies to: Internal Authenticated Vulnerability scans, Secure Baseline scans

What to check

  • Confirm Java files were successfully deployed by the agent

  • Review endpoint protection or EDR controls that may block Java deployment

If Java files are blocked, scanning cannot proceed.


4. Check Network Connectivity and Disk Space

(Inaccessible OVAL File)

Applies to: Internal Authenticated Vulnerability scans

What to check

  • Ensure stable network connectivity during the scan

  • Confirm sufficient disk space is available on the target machine

If the vulnerability database cannot be accessed or downloaded, the scan will fail.


5. Diagnose “No ARF File” Errors

(No ARF File)

Applies to: Internal Authenticated Vulnerability scans

The ARF (Asset Reporting Format) file contains the results of the vulnerability scan. If it is missing, the scan did not complete successfully.

Confirmed causes

  • PowerShell startup delays

  • PowerShell timeouts

  • I/O exceptions during scan execution

  • Corrupted or misconfigured PowerShell environments

What to check

  • Verify PowerShell launches successfully on the target machine

  • Confirm PowerShell commands execute without delay or error

Failures during scan execution prevent ARF file creation.


Resolution

Most scan failures caused by target or resource constraints are resolved by one or more of the following actions:

  • Ensuring targets are online and reachable during scans

  • Verifying at least 1 GB of available memory on the scanning agent

  • Allowing Java file deployment by endpoint protection controls

  • Ensuring stable network connectivity during scan execution

  • Confirming sufficient disk space on the target machine

  • Restoring normal PowerShell functionality on affected systems

After corrective actions are taken, rerun the scan and confirm successful completion.


When to Contact Support

Contact Cyrisma Support if:

  • Scan failures persist after completing all diagnostic steps

  • The same errors recur across multiple targets with similar configurations

  • Logs indicate repeated execution or resource-related failures

Provide:

  • Scan type (Secure Baseline or Internal Authenticated Vulnerability)

  • Scan name

  • Affected target machines

  • Relevant scan or agent logs

  • Summary of troubleshooting steps already completed