Overview
SecurityHive’s Vulnerability Management engine supports authenticated scans, which provide deeper visibility into vulnerabilities on systems by logging into them directly. While this method significantly increases the accuracy and coverage of scan results, it may also trigger endpoint security alerts in some environments.
This article explains:
How authenticated scans work
Why they trigger alerts in certain antivirus or endpoint detection & response (EDR) tools
Recommended mitigation steps
Alternative options if filtering by user is not possible
What Is an Authenticated Scan?
An authenticated scan is a type of vulnerability scan where the scanner logs into a system (e.g., via SSH for Linux or WMI/SMB for Windows) using valid credentials. This provides local access to files, processes, and configurations, enabling more accurate vulnerability detection—especially for:
Missing patches
Insecure configurations
Unpatched local software
Privilege escalation paths
These scans rely on protocols and techniques that simulate lateral movement—much like what a legitimate system administrator or attacker would do.
Why Endpoint Security Tools Raise Alerts
Many modern EDR and antivirus solutions use behavioral detection to flag suspicious activity, especially those resembling:
Lateral movement
Credential use or reuse
Tooling similar to Impacket
SecurityHive’s scan engine uses legitimate login credentials to remotely query systems, sometimes with techniques that resemble tools like Impacket. As a result, solutions like Sophos Intercept X, SentinelOne, and Microsoft Defender for Endpoint may raise alerts or even block the scan.
These alerts are false positives in this context—flagging legitimate scanning behavior as malicious.
Recommended Mitigation Steps
To minimize disruption and alert fatigue, we recommend the following:
Create a Dedicated Scan User (Instructions)
Use a system or domain user specifically for vulnerability scans (e.g.,
svc_vulnscan
).Limit its privileges to what's required for scanning (e.g., read-only WMI access, local admin for Windows, SSH access for Linux).
Configure Endpoint Security Exclusions
Set up a rule in your EDR or antivirus platform to ignore or whitelist actions performed by the dedicated scan user.
This typically involves adding:
The scan user account to an exclusion list
Specific process paths or hash exclusions
Network-based exclusions for known scanner IPs
⚠️ Note: Not all endpoint protection platforms support user-based or behavior-based exclusions. Some may only allow exclusions by file path or hash.
❗ If Exclusions Are Not Supported
If your endpoint security solution does not support user-based or behavioral exclusions, you have two alternatives:
1. Disable Authenticated Scans
You may opt to run unauthenticated scans, which still detect network-facing vulnerabilities, but lack local insight into installed software, patches, and configurations.
2. Deploy the SecurityHive Vulnerability Agent
Our lightweight agent collects local vulnerability data directly on the endpoint and reports it to the SecurityHive platform. This provides:
Full visibility without triggering lateral movement alerts
Compatibility with most EDR/AV environments
Continuous scanning
Learn more about the SecurityHive Vulnerability Agent here.
Summary
Feature | Authenticated Scan | Vulnerability Agent |
Requires system credentials | ❌ Yes | ✅ No |
Triggers EDR/AV alerts | ⚠️ Possibly | ✅ No |
Supports deep local checks | ✅ Yes | ✅ Yes |
Exclusion workaround possible | ✅ Yes (if supported) | Not needed |