Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Roles contain the definitions for users that are allowed to CRUD these items (regardless of license). Just like Baselines, for example.

The attributes for discovery scan options are as below.

AttributeDescription
idThe standard ID of an auto-incrementing integer.
nameThe standard 'name' of a collection item. Ideally should be unique.
org_idThe Org that owns this entry.
descriptionThe standard description field.
optionsUnused at present. Options fields within the Open-AudIT schema are generally designed to hold a stringified JSON object.
edited_byThe user that created or last edited this entry.
edited_dateThe standard date/time this entry was created or last edited.
  
ping - Must Respond To PingIf set, Nmap will fist attempt to send and listen for an ICMP response. If the device does not respond, no further scanning will occur. Previously a device did not have to respond to a ping for Open-AudIT to continue scanning.
service_version - Use Service Version DetectionWhen a detected port is detected as open, if set to 'y', Nmap will query the target device in an attempt to determine the version of the service running on this port. This can be useful when identifing unclassified devices. This weas not previouslt used.
filtered - Consider Filtered Ports OpenPreviously, Open-AudIT considered an Nmap response of "open|filtered" as a device responding on this port. This has caused some customers issues where firewalls respond on behalf of a non-existing device, and hence cause false positive device detection. We now have this attribute available to set per scan.
timing - TimingThe standard Nmap timing options. Previously set at T4 (aggressive).
nmap_tcp_ports - - Top Nmap TCP PortsThe top 10, 100, 1000 ports to scan as per Nmaps "top ports" options. Previously we scanned the Top 1000 ports (the Nmap standard).
nmap_udp_ports - Top Nmap UDP PortsThe top 10, 100, 1000 ports to scan as per Nmaps "top ports" options. Previously we scanned UDP 161 (snmp) only.
tcp_ports - Custom TCP PortsAny specific ports we would liuke scanned in addition to the Top TCP Ports. Comma seperated, no spaces.
udp_ports - Custom UDP PortsAny specific ports we would liuke scanned in addition to the Top UDP Ports. Comma seperated, no spaces.
timeout - Timeout per TargetWait for X seconds for a target response.
exclude_tcp - Exclude TCP PortsExclude any ports listed from being scanned. Comma seperated, no spaces.
exclude_udp - Exclude UDP PortsExclude any ports listed from being scanned. Comma seperated, no spaces.
exclude_ip - Exclude IP AddressesExclude IP Addresses (individual IP - 192.168.1.20, ranges - 192.168.1.30-40 or subnets - 192.168.1.100/30) listed from being scanned. Comma seperated, no spaces.
ssh_port - SSH PortScan for this port and if detected open, use this port for SSH communication. This is added to the list of Custom TCP POrts above, so there is no need to include it in that listr as well. Comma seperated, no spaces.

Database Schema

CREATE TABLE `discovery_scan_options` (
`id` int(10) unsigned NOT NULL AUTO_INCREMENT,
`name` varchar(100) NOT NULL DEFAULT '',
`org_id` int(10) unsigned NOT NULL DEFAULT '1',
`description` text NOT NULL,
`ping` enum('','y','n') NOT NULL DEFAULT 'y',
`service_version` enum('','y','n') NOT NULL DEFAULT 'n',
`filtered` enum('','y','n') NOT NULL DEFAULT 'n',
`timeout` int(10) unsigned NOT NULL DEFAULT '0',
`timing` int(1) unsigned NOT NULL DEFAULT 4,
`nmap_tcp_ports` int(10) unsigned NOT NULL DEFAULT '0',
`nmap_udp_ports` int(10) unsigned NOT NULL DEFAULT '0',
`tcp_ports` text NOT NULL,
`udp_ports` text NOT NULL,
`exclude_tcp_ports` text NOT NULL,
`exclude_udp_ports` text NOT NULL,
`exclude_ip` text NOT NULL,
`ssh_ports` text NOT NULL,
`options` text NOT NULL,
`edited_by` varchar(200) NOT NULL DEFAULT '',
`edited_date` datetime NOT NULL DEFAULT '2000-01-01 00:00:00',
PRIMARY KEY (`id`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8;

...