ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page

Was this helpful?

  1. Operation
  2. Platform
  3. Penetration Testing (Hacktor)

Auth-Providers

PreviousTarget GroupsNextHacktor

Last updated 1 year ago

Was this helpful?

With an auth provider, you can store access data of target systems to obtain more information. Access to the target system allows getting the operating system and installed software. Therefore, Hacktor can detect and validate more vulnerabilities (CVEs) than if only the publicly accessible information is available to it.

Use the search bar to display the desired entries.

Access data can be stored for the following services:

  • SSH (Secure Shell): Protocol for remote maintenance and administration of servers and clients, which is mainly used for Linux servers and clients.

  • WMI (Windows Management Instrumentation): Service for remote maintenance and administration of Windows servers and clients.

  • SNMP v1/v2/v3 (Simple Network Management Protocol): Protocol for monitoring and controlling network devices, which is mainly used for printers, switches or industrial installations.

Field Level Encryption

By implementing field-level encryption, sensitive fields are now individually encrypted, ensuring a much higher level of protection for your data. This encryption technology allows you to specifically secure certain data fields, which significantly minimizes potential security risks.

Learn how to set up Field Level Encryption in our .

For servers and clients running a version of Windows or Linux, we still recommend installing an to monitor vulnerabilities from the inside. The scope and validity of the results of the CVE scan from the inside are superior to the hacktor scan, even with the auth provider stored. In addition, the CVE scan with Pulsar agent installed allows more convenient administration and is preferable from a security point of view, since no credentials have to be stored or accesses enabled.

guide
Enginsight Pulsar Agent