Skip to main content

Authenticated Scans and Endpoint Security Alerts: What You Need to Know

Updated over 2 weeks ago

Overview

SecurityHive’s Vulnerability Management engine supports authenticated scans, which provide deeper visibility into vulnerabilities on systems by logging into them directly. While this method significantly increases the accuracy and coverage of scan results, it may also trigger endpoint security alerts in some environments.

This article explains:

  • How authenticated scans work

  • Why they trigger alerts in certain antivirus or endpoint detection & response (EDR) tools

  • Recommended mitigation steps

  • Alternative options if filtering by user is not possible


What Is an Authenticated Scan?

An authenticated scan is a type of vulnerability scan where the scanner logs into a system (e.g., via SSH for Linux or WMI/SMB for Windows) using valid credentials. This provides local access to files, processes, and configurations, enabling more accurate vulnerability detection—especially for:

  • Missing patches

  • Insecure configurations

  • Unpatched local software

  • Privilege escalation paths

These scans rely on protocols and techniques that simulate lateral movement—much like what a legitimate system administrator or attacker would do.


Why Endpoint Security Tools Raise Alerts

Many modern EDR and antivirus solutions use behavioral detection to flag suspicious activity, especially those resembling:

  • Lateral movement

  • Credential use or reuse

  • Tooling similar to Impacket

SecurityHive’s scan engine uses legitimate login credentials to remotely query systems, sometimes with techniques that resemble tools like Impacket. As a result, solutions like Sophos Intercept X, SentinelOne, and Microsoft Defender for Endpoint may raise alerts or even block the scan.

These alerts are false positives in this context—flagging legitimate scanning behavior as malicious.


Recommended Mitigation Steps

To minimize disruption and alert fatigue, we recommend the following:

  1. Create a Dedicated Scan User (Instructions)

    • Use a system or domain user specifically for vulnerability scans (e.g., svc_vulnscan).

    • Limit its privileges to what's required for scanning (e.g., read-only WMI access, local admin for Windows, SSH access for Linux).

  2. Configure Endpoint Security Exclusions

    • Set up a rule in your EDR or antivirus platform to ignore or whitelist actions performed by the dedicated scan user.

    • This typically involves adding:

      • The scan user account to an exclusion list

      • Specific process paths or hash exclusions

      • Network-based exclusions for known scanner IPs

⚠️ Note: Not all endpoint protection platforms support user-based or behavior-based exclusions. Some may only allow exclusions by file path or hash.


❗ If Exclusions Are Not Supported

If your endpoint security solution does not support user-based or behavioral exclusions, you have two alternatives:

1. Disable Authenticated Scans

You may opt to run unauthenticated scans, which still detect network-facing vulnerabilities, but lack local insight into installed software, patches, and configurations.

2. Deploy the SecurityHive Vulnerability Agent

Our lightweight agent collects local vulnerability data directly on the endpoint and reports it to the SecurityHive platform. This provides:

  • Full visibility without triggering lateral movement alerts

  • Compatibility with most EDR/AV environments

  • Continuous scanning

Learn more about the SecurityHive Vulnerability Agent here.


Summary

Feature

Authenticated Scan

Vulnerability Agent

Requires system credentials

❌ Yes

✅ No

Triggers EDR/AV alerts

⚠️ Possibly

✅ No

Supports deep local checks

✅ Yes

✅ Yes

Exclusion workaround possible

✅ Yes (if supported)

Not needed

Did this answer your question?