Getting Started
- Introduction
- Welcome
- Set Up Telivy Account
Products
- External Assessments
- Risk Assessments
- Lead Magnet
Frequently Asked Questions
Additional Information
Risk Assessments and External Scans
Common questions and answers
There are two types of assessments that can be created:
This is our complete assessment. It covers:
-
Network scanning (Internal & External)
-
Application scanning (cloud apps & desktop apps)
-
Data Security - PII detection on systems
-
Identity & Access Management
-
Password management
-
M365 Security
External Scans:
Installation: 2 min
Scanning: 10-15 min
Risk Assessment:
Installation: 10 mins
Scanning: 2-3 hours
Please refer to this document for more details on the different steps needed to complete the different Risk Assessments.
You can add an IP/domain to an external scan by going to “Targets” > “Add Target” (top right) to add an IP address or additional domains.
For a Risk Assessment or an External Scan, click on the “Archive” button in the topic right corner to archive the assessment.
The assessment will not show up on your dashboard.
For a Risk Assessment, note that archiving will uninstall the Telivy scanners from any assets that are installed.
The ‘Rescan All’ feature deploys all the scans to refresh data. This includes:
-
Vulnerabilities
-
PII
-
Credential analysis
-
Risky Applications
-
Microsoft 365
-
External Attack Surface
-
Asset Inventory
For External Scans, under the “Security” tab, navigate to “Targets” and click on “Add Target” to add either an external IP address or another domain.
For Risk Assessments, under the “Assets” tab, navigate to “Domain/IP Address” and click on “Add Target” to add either an external IP or another domain.
You can add an external scan by going to “Assets” > “Domain / IP Addresses” > “Add Target” (top right) and then you can add an IP address or additional domains.
We offer two options for every assessment.
- Agent
-
You can deploy rapidly using your RMM
-
You can leave Telivy deployed and “rescan” on demand
-
You will generate the most comprehensive data
-
You can convert a CSRA to “Monitoring” where Telivy will rescan and help build risk-over-time charts and graphs
-
With Monitoring you can also set policies and receive alerts when a policy is violated
- Agentless (Non Agent)
-
Recommended for new clients as it does not require any installation or uninstallation
-
Link to executable can be sent on email, very useful for prospecting when you don’t have RMM setup to the devices to install agent
-
It tries to run as admin, if no permission granted then runs as non admin
-
Non admin scan limitations
-
PII scan done only for files accessible by the local use
-
Browser history and passwords captured only for the local user
-