Telivy home pagelight logodark logo
  • Contact Us
  • Log In
  • Log In
Frequently Asked Questions
Risk Assessments and External Scans
  • Documentation
  • Website
  • Getting Started
    • Introduction
    • Welcome
    • Set Up Telivy Account
    Learning Center
    • Dark Web Scans
    • Typo-squatting
    • Open Ports
    • SSL/TLS Misconfigurations
    Products
    • External Assessments
    • Risk Assessments
    • Lead Magnet
    Frequently Asked Questions
    • Getting Started
    • Installation and Troubleshooting
    • Integrations
    • Microsoft 365 and Google Workspace
    • Risk Assessments and External Scans
    • Telivy Accounts and Platforms
    • Uninstallation
    • ThreatLocker and Telivy Policy During Installation
    Scoring
    • AI Scoring
    • Microsoft Scoring
    • Telivy Grading Criteria
    Integrations
    • Nodeware
    • Rewst
    • Telivy Webhook
    Additional Information
    • Release Notes
    Frequently Asked Questions

    Risk Assessments and External Scans

    Common questions and answers

    There are two types of assessments that can be created:

    This is our complete assessment. It covers:

    1. Network scanning (Internal & External)

    2. Application scanning (cloud apps & desktop apps)

    3. Data Security - PII detection on systems

    4. Identity & Access Management

    5. Password management

    6. M365 Security

    This is our complete assessment. It covers:

    1. Network scanning (Internal & External)

    2. Application scanning (cloud apps & desktop apps)

    3. Data Security - PII detection on systems

    4. Identity & Access Management

    5. Password management

    6. M365 Security

    This is the external scan which uses the domain(s) and any public IPs of a client. For an in depth description of the different risk assessments, please refer to this document.

    External Scans:

    Installation: 2 min

    Scanning: 10-15 min

    Risk Assessment:

    Installation: 10 mins

    Scanning: 2-3 hours

    Please refer to this document for more details on the different steps needed to complete the different Risk Assessments.

    You can add an IP/domain to an external scan by going to “Targets” > “Add Target” (top right) to add an IP address or additional domains.

    For a Risk Assessment or an External Scan, click on the “Archive” button in the topic right corner to archive the assessment.

    The assessment will not show up on your dashboard.

    For a Risk Assessment, note that archiving will uninstall the Telivy scanners from any assets that are installed.

    The ‘Rescan All’ feature deploys all the scans to refresh data. This includes:

    • Vulnerabilities

    • PII

    • Credential analysis

    • Risky Applications

    • Microsoft 365

    • External Attack Surface

    • Asset Inventory

    For External Scans, under the “Security” tab, navigate to “Targets” and click on “Add Target” to add either an external IP address or another domain.

    For Risk Assessments, under the “Assets” tab, navigate to “Domain/IP Address” and click on “Add Target” to add either an external IP or another domain.

    You can add an external scan by going to “Assets” > “Domain / IP Addresses” > “Add Target” (top right) and then you can add an IP address or additional domains.

    We offer two options for every assessment.

    1. Agent
    • You can deploy rapidly using your RMM

    • You can leave Telivy deployed and “rescan” on demand

    • You will generate the most comprehensive data

    • You can convert a CSRA to “Monitoring” where Telivy will rescan and help build risk-over-time charts and graphs

    • With Monitoring you can also set policies and receive alerts when a policy is violated

    1. Agentless (Non Agent)
    • Recommended for new clients as it does not require any installation or uninstallation

    • Link to executable can be sent on email, very useful for prospecting when you don’t have RMM setup to the devices to install agent

    • It tries to run as admin, if no permission granted then runs as non admin

    • Non admin scan limitations

      • PII scan done only for files accessible by the local use

      • Browser history and passwords captured only for the local user

    Microsoft 365 and Google WorkspaceTelivy Accounts and Platforms
    facebooklinkedin
    Powered by Mintlify