08-12-2025 11:43 PM
Hi,
I can't find a proper way to exclude a vulnerability scanner IP from alerts in SCA.
One possible way to solve this (I guess) is to add entity groups for source IP and destination subnets. Afterwards select these entity groups in an Internal Connection Watchlist item and set the rule to "allow". This isn't very handy and I hope there is another way to whitelist the scanner IP from alerts.
Any suggestions?
08-13-2025 04:33 AM
Hi,
Depending on the alerts you are receiving or your vulnerability scanner, you might check IP Scanner Rules.
"Enter IP scanners that are permissible on your network. Scanning rules on this list will be excluded from several alerts, including the Internal Port Scanner alert, the New IP Scanner alert, the NetBIOS Connection Spike alert, SMB Connection Spike alert, the Outbound SMB Spike alert, the New SNMP Sweep alert, the Outbound LDAP Spike alert, the LDAP Connection Spike alert, and the Non-Service Port Scanner alert."
08-13-2025 05:15 AM
Thank you for your reply.
As I understand IP Scanner rules, I have to enter each destination address to this rule. This is pretty unhandy as there are several targets and possible changes in of IPs. Is it therefore possible to allow the source address of the scanner somehow?
08-13-2025 05:28 AM
If you don't want to limit the targets you can put "0.0.0.0/0" in the Target Address section and it should work. This would silence the selected alarms to all IPs. Depending on your deployment you might want to limit this to only private IPs by adding 3 private IP blocks.
08-14-2025 11:38 PM
Perhaps I am misinterpreting the rules.
As I understand the rule, I have to enter the targets here. That is correct, isn't it?
If I now enter 0.0.0.0/0 or only the private addresses, I will no longer detect scans from potential attackers because I have removed my entire infrastructure from this alarm. In my opinion, this is the wrong approach, as I will lose sight of potential attacks or be spammed with constant false positives.
08-21-2025 06:55 AM
If you create a rule and hover over the question marks on the rules you can see the explanations. Prefix section should be your scanner ( this is basically your scanner) and the target section should be the part of the network which will be scanned by the prefix. With this you are basically whitelisting the traffic between the prefix and the target network for the events I mentioned on the previous post. If there is another host performs scans you will get alarms for that traffic.
In this example I am allowing the 192.168.100.1 to scan all IP ranges on all ports. You can test this by creating a rule for your scanner IP and initiating a test scan on your endpoint, or if you have multiple IPs on your scanners you can just create a rule for single IP and see alerts only stop for the IP(s) rule configured for.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide