Internal Authenticated Vulnerability Scans
Last updated: December 18, 2025
Internal Authenticated Vulnerability Scans are used to identify security vulnerabilities, misconfigurations, and missing patches on systems inside the network using authenticated access. These scans provide the most accurate and comprehensive vulnerability results available in Cyrisma.
This article explains how authenticated scans work, how they are executed, what they require, and what data they collect.
What Internal Authenticated Vulnerability Scans Do
Internal Authenticated Vulnerability Scans evaluate systems from the perspective of an authorized user or administrator. By using valid credentials, the scan gains deeper visibility into the system than is possible with network-only scanning.
These scans are commonly used to:
Identify vulnerabilities based on installed software and patch levels
Detect missing operating system and application updates
Identify insecure configurations and services
Perform accurate CVE-based vulnerability detection
Support remediation, patching, and risk prioritization
Execution Models
Internal Authenticated Vulnerability Scans support two execution models. Selecting the correct model is critical to scan success.
1) Agent-Based Scanning (Recommended)
Agent-based scanning uses a scan agent installed directly on each target system. Each system scans itself locally.
How it works
The agent runs locally on the target
No remote access is required
No credentials are required for local scanning
When to use
Systems where an agent can be installed
Scans requiring maximum depth and accuracy
Key characteristics
Highest accuracy and lowest failure rate
No dependency on network permissions
Targets without agents cannot be scanned using this method
2) Sensor-Based Scanning (Probe Scanning)
Sensor-based scanning uses a single agent to scan multiple systems remotely across the network.
How it works
One agent acts as a sensor (probe)
The sensor connects to remote systems using credentials
Vulnerability data is collected remotely
When to use
Agents cannot be installed on all systems
Preliminary or centralized scanning is required
Key characteristics
Requires valid credentials
Dependent on network connectivity and permissions
Less depth than agent-based scanning
Credential Requirements
Credential requirements depend on the execution model:
Agent-based scans:
No credentials required
Scanning is performed locally by the agent
Sensor-based scans:
Credentials are required for remote systems
Credentials should have administrative-level access
NT / NetBIOS format must be used for Windows systems
Azure AD–joined systems cannot be authenticated remotely using NTLM and must be scanned using agent-based scanning.
Data Collected
Authenticated scans collect detailed system-level information, including:
Installed software, patch levels, and OS hotfixes
Running processes and services
Registry entries, scheduled tasks, and configuration settings
Local user accounts and group memberships
Antivirus, firewall, and endpoint protection status
File system data, including sensitive files or misconfigurations
Accurate CVE and patch-based vulnerability detection
Accuracy Considerations
Authenticated scans provide significantly more accurate results than unauthenticated scans because they:
Validate vulnerabilities using installed software data
Reduce false positives
Identify vulnerabilities not visible over the network
Provide deeper insight into system security posture
Sensor-based authenticated scans improve accuracy over unauthenticated scans but do not match the depth of agent-based scanning.
Prerequisites
To run Internal Authenticated Vulnerability Scans successfully:
At least one scan agent must be deployed
For sensor-based scans:
The sensor must have network access to targets
Credentials must be valid and properly scoped
Endpoint protection must allow agent activity
Performance Considerations
Scan duration is influenced by:
Number of systems in scope
Execution model used
Network latency (for sensor-based scans)
Endpoint protection interference
Best practice:
Prefer agent-based scanning where possible
Validate credentials before large sensor-based scans
Schedule scans during off-peak hours
Common Limitations
Systems without agents cannot be scanned using agent-based scanning
Sensor-based scans may fail due to credential or network issues
Azure AD–joined systems cannot be scanned remotely
Endpoint protection may interfere if allowlisting is not configured
Best Practices
Use agent-based scanning whenever possible
Use sensor-based scanning only when agents cannot be deployed
Use dedicated service accounts with least-privilege access
Ensure endpoint protection allowlisting is in place
Re-run scans regularly to track remediation progress