TechTarget.com/searchnetworking

https://www.techtarget.com/searchnetworking/definition/network-scanning

What is network scanning? How to, types and best practices

By Paul Kirvan

Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response. Most network scanning is used to monitor and manage networks, but scanning can also be used to proactively identify vulnerabilities that cyberattackers could exploit.

Many different network scanning tools are available, including open source tools and commercial network scanning products. Different platforms come with different functions, so it is important to choose a tool with the right features for an organization's needs.

How does network scanning work?

The specific protocol features used in scanning depend on the network. for Internet Protocol (IP) networks, scanning normally sends a simple message -- a ping, for example -- to each possible IP address in a specified range. If a response to the ping is received, the network scanner then uses another protocol to obtain data on the devices. This is referred to as active scanning.

By contrast, passive network scanning involves continuously monitoring network traffic for potential risks, such as malicious code, and flagging potential issues for further analysis.

In monitoring and management systems, network administrators routinely use scanning for three management functions:

  1. To use network discovery functionality to identify and establish an inventory of network users.
  2. To determine the state of systems and devices.
  3. To take a further inventory of network elements that are compared against a list of expected devices as a metric of network health.

Cybercriminals use the same tools and protocols as network admins to scan potential targets. In a malicious scenario, an attacker first obtains the IP address range assigned to a company using the domain name system or the WHOIS protocol. Addresses within that range are scanned to look for servers, operating systems, system architecture and the services. The attacker then attempts to access ports that are open and not properly secured to breach the target systems and applications.

Why is network scanning important?

Considering the volume of cyberthreats that occur daily -- and the breadth of potential network vulnerabilities -- scanning is an important part of maintaining a network's health and protecting it from cyberattacks. It's an essential network security tool and should be performed regularly. Threats can materialize in an instant, and network scanning plays a significant role in identifying and troubleshooting potential security vulnerabilities and threats.

The key to effective network scanning is to perform it often, even though network performance might be degraded slightly while scanning is in progress. These tools provide a detailed network map with the following information:

In short, scanning helps cybersecurity and network security administrators stay ahead of hackers and other threat actors.

Network scanning steps

The following five steps are included in most network scan processes:

What types of network scans are available?

Scans fall into two basic categories: active and passive. They can also be categorized into more specialized functions:

Network scanning best practices

Several practices are recommended to obtain the best results from network scanning:

Find out more about how to deal with the challenges of monitoring and maintaining an enterprise network.

29 Jul 2024

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement