Running Scans with Atlas Discovery

Jun 1, 2023

Running Scans with Atlas Discovery

Running Scans with Atlas Discovery

Atlas Discovery allows you to run both external and internal network scans to populate your Certificate inventory and dashboard. These scans, once configured, run automatically and then every 24 hours thereafter. External scans can be configured to include subdomains, internal scans require the download of an agent.

The status of the scan and when it was last run are also displayed on this page. Note that internal scan statuses will remain “not started” until the agent is properly downloaded and activated.

Here’s what you can do with scan profiles:

  • A scan profile can take up to 5 separate targets. Enter an FQDN or IPv4 address or range into the scan target field.
  • Even though scans run every 24 hours, you can choose to run the scan at any time by clicking the “Run” action button for that scan.
  • Once a scan profile is created, you can make changes to the profile or delete it.

External Scans

External network scans allow users to scan specific domains and subdomains to detect, observe, and manage TLS Certificates. Enter a FQDN or public IPv4 address or range into a target field to enable scanning of that domain or web server.

Note that for subdomains, the current implementation looks at the top 200 most commonly used subdomains. We are planning to expand this in future releases.

  1. In Atlas, navigate to Discovery and then to the Scan Profiles page. Click to create a new scan profile.
  2. Name the profile and choose the “external” scan profile type.
  3. Enter the domain name or a public IPv4 address or range. Toggle to include subdomains of this domain if you wish.
  4. Set the port that you want to scan. The default is port 443. You can only enter one port per target.
  5. Save your changes, and then the scan job will begin. It may take several minutes for your inventory or dashboard to populate with the results.

Internal Scans

Internal network scans allow users to scan network ports to detect, observe, and manage TLS certificates by a chosen IPv4 address or range. For the internal scan to successfully run, you need to create an agent, which is a lightweight network utility that will monitor your internal network and send the results to Atlas Discovery.

Agents are available for Windows, Linux, and Darwin (macOS). The Windows agent is codesigned with a GlobalSign Codesigning Certificate.
 

  1. In Atlas, navigate to Discovery and then to the Scan Profiles page. Click to create a new scan profile.
  2. Name the profile and choose the “agent” scan profile type.
  3. Enter the domain name, private IPv4 address, or range.
  4. Set the port that you want to scan. The default port is 443. You can only enter one port per target.
  5. Save the profile. The page will reveal further onscreen instructions.
  6. Choose your operating system, and then download the agent.
  7. Open a command line in the directory where the agent was installed. Don't try to open the agent itself; nothing will happen.
  8. Copy the provided token from Atlas Discovery and paste it into the command line to activate the agent. The agent is defaulted to run every 24 hours, but you can adjust this by modifying the “-frequency” parameter. You can also add the “-verbose” parameter, which will display polling information from the agent.
  9. Close the scan configuration window in Atlas Discovery.

For Linux and Darwin implementations, change the agent's executable permissions using the command chmod a+x.

To run the agent for Darwin implementations,

  1. On the security pop-up, click Cancel.
  2. Go to the System Preferences > Security & Privacy > General tab. Click “Allow Anyway” where it says that the app was blocked.
  3. Run the agent again, and on the next pop-up, click Open.
     

The activation token is good for one year. If you lose it and need to reactivate the agent, you can get a new token by clicking the “Reset Token” button in the scan configuration screen. 

What is the IP address for the internal scanning agent?

Atlas Discovery has a downloadable agent through which you can send discovered internal Certificates to your Discovery inventory. The Windows version of the agent has been codesigned with a GlobalSign Certificate.

To send Certificates to Atlas Discovery, the agent consumes public APIs hosted on the AWS API Gateway. In most implementations, the agent will work simply by downloading and activating it via the portal instructions. In some implementations, however, the public IP address needs to be allowlisted prior to agent activation. This list contains a list of possible IP Address ranges into which the external IP can fall. You will have to allow all of them in order for the agent to communicate with Atlas. We will deploy a change in a future release that will eliminate the need for this list.

  • 13.248.123.0/24
  • 13.248.97.0/24
  • 13.34.33.0/27
  • 13.34.33.128/27
  • 13.34.33.160/27
  • 13.34.33.32/27
  • 13.34.33.64/27
  • 13.34.33.96/27
  • 13.34.47.0/27
  • 13.34.47.32/27
  • 13.34.47.64/27
  • 13.34.47.96/27
  • 13.34.5.0/27
  • 13.34.5.32/27
  • 13.34.5.64/27
  • 13.34.5.96/27
  • 13.34.73.128/27
  • 13.34.73.160/27
  • 13.34.73.64/27
  • 13.34.73.96/27
  • 13.34.9.76/32
  • 136.18.18.0/24
  • 142.4.160.152/29
  • 142.4.160.192/29
  • 15.177.68.0/23
  • 15.193.4.0/24
  • 15.220.144.0/23
  • 15.220.152.0/21
  • 15.220.48.0/21
  • 15.220.64.0/20
  • 15.221.3.0/24
  • 15.230.131.0/24
  • 15.230.144.0/24
  • 15.230.241.0/24
  • 15.230.52.0/24
  • 15.230.64.192/26
  • 15.230.65.0/26
  • 15.230.65.64/26
  • 15.230.80.0/24
  • 15.230.85.0/24
  • 150.222.10.0/24
  • 150.222.104.0/24
  • 150.222.120.20/31
  • 150.222.120.224/31
  • 150.222.120.226/31
  • 150.222.120.228/31
  • 150.222.120.230/31
  • 150.222.120.232/31
  • 150.222.120.234/31
  • 150.222.120.240/31
  • 150.222.120.242/31
  • 150.222.120.244/31
  • 150.222.120.246/31
  • 150.222.120.248/31
  • 150.222.120.250/31
  • 150.222.120.252/32
  • 150.222.120.255/32
  • 150.222.120.62/31
  • 150.222.122.100/31
  • 150.222.122.102/31
  • 150.222.122.104/31
  • 150.222.122.106/31
  • 150.222.122.108/31
  • 150.222.122.110/31
  • 150.222.122.112/31
  • 150.222.122.114/31
  • 150.222.122.116/31
  • 150.222.122.92/31
  • 150.222.122.94/31
  • 150.222.122.96/31
  • 150.222.122.98/31
  • 150.222.129.110/31
  • 150.222.129.112/31
  • 150.222.129.114/31
  • 150.222.129.116/31
  • 150.222.129.118/31
  • 150.222.129.120/31
  • 150.222.129.122/31
  • 150.222.129.124/31
  • 150.222.129.126/31
  • 150.222.129.128/31
  • 150.222.129.130/31
  • 150.222.129.132/31
  • 150.222.129.134/31
  • 150.222.129.136/31
  • 150.222.129.138/31
  • 150.222.129.140/31
  • 150.222.129.142/31
  • 150.222.129.144/31
  • 150.222.129.146/31
  • 150.222.129.148/32
  • 150.222.129.149/32
  • 150.222.129.150/32
  • 150.222.129.151/32
  • 150.222.129.152/31
  • 150.222.129.154/31
  • 150.222.129.156/31
  • 150.222.129.158/31
  • 150.222.129.19/32
  • 150.222.129.20/31
  • 150.222.129.224/31
  • 150.222.129.226/31
  • 150.222.129.240/31
  • 150.222.129.242/31
  • 150.222.129.244/31
  • 150.222.129.246/31
  • 150.222.129.248/31
  • 150.222.129.250/31
  • 150.222.129.252/32
  • 150.222.129.255/32
  • 150.222.129.62/31
  • 150.222.129.64/31
  • 150.222.129.66/31
  • 150.222.129.69/32
  • 150.222.139.116/30
  • 150.222.139.120/30
  • 150.222.139.124/30
  • 150.222.230.100/31
  • 150.222.230.102/31
  • 150.222.230.104/31
  • 150.222.230.106/31
  • 150.222.230.108/31
  • 150.222.230.110/31
  • 150.222.230.112/31
  • 150.222.230.114/31
  • 150.222.230.116/31
  • 150.222.230.118/31
  • 150.222.230.120/31
  • 150.222.230.122/31
  • 150.222.230.124/31
  • 150.222.230.126/31
  • 150.222.230.128/31
  • 150.222.230.130/31
  • 150.222.230.51/32
  • 150.222.230.92/32
  • 150.222.230.93/32
  • 150.222.230.94/31
  • 150.222.230.96/31
  • 150.222.230.98/31
  • 150.222.245.122/31
  • 150.222.27.12/32
  • 150.222.27.18/31
  • 150.222.27.234/31
  • 150.222.5.0/24
  • 151.148.35.0/24
  • 16.12.24.0/21
  • 16.12.32.0/22
  • 18.153.0.0/16
  • 18.156.0.0/14
  • 18.157.237.128/26
  • 18.157.237.192/26
  • 18.157.71.192/26
  • 18.184.0.0/15
  • 18.192.0.0/15
  • 18.194.0.0/15
  • 18.196.0.0/15
  • 18.198.0.0/15
  • 18.89.0.0/18
  • 3.120.0.0/14
  • 3.122.128.0/23
  • 3.123.12.192/26
  • 3.123.14.0/24
  • 3.123.15.0/25
  • 3.124.0.0/14
  • 3.127.48.128/26
  • 3.127.74.0/23
  • 3.2.35.0/26
  • 3.33.35.0/24
  • 3.5.134.0/23
  • 3.5.136.0/22
  • 3.64.0.0/12
  • 3.66.172.0/24
  • 3.70.195.128/25
  • 3.70.195.64/26
  • 3.70.211.0/25
  • 3.70.212.128/26
  • 3.71.104.0/24
  • 3.71.120.0/22
  • 3.72.168.0/24
  • 3.72.33.128/25
  • 3.74.148.128/26
  • 3.75.112.0/24
  • 35.156.0.0/14
  • 35.71.105.0/24
  • 52.119.188.0/22
  • 52.144.209.0/26
  • 52.144.210.192/26
  • 52.144.211.0/26
  • 52.219.140.0/24
  • 52.219.168.0/24
  • 52.219.169.0/24
  • 52.219.170.0/23
  • 52.219.208.0/23
  • 52.219.210.0/24
  • 52.219.211.0/24
  • 52.219.218.0/24
  • 52.219.44.0/22
  • 52.219.72.0/22
  • 52.28.0.0/16
  • 52.29.0.0/16
  • 52.46.184.0/22
  • 52.57.0.0/16
  • 52.58.0.0/15
  • 52.93.126.132/32
  • 52.93.126.133/32
  • 52.93.126.134/32
  • 52.93.126.135/32
  • 52.93.127.138/32
  • 52.93.127.139/32
  • 52.93.127.237/32
  • 52.93.127.238/32
  • 52.94.136.0/21
  • 52.94.146.0/24
  • 52.94.17.0/24
  • 52.94.198.48/28
  • 52.94.204.0/23
  • 52.94.248.112/28
  • 52.94.69.0/24
  • 52.95.248.0/24
  • 52.95.255.128/28
  • 54.239.0.160/28
  • 54.239.106.0/23
  • 54.239.4.0/22
  • 54.239.54.0/23
  • 54.239.56.0/21
  • 54.239.64.0/21
  • 54.93.0.0/16
  • 57.104.0.0/13
  • 64.252.86.0/24
  • 64.252.87.0/24
  • 64.252.88.0/24
  • 64.252.89.0/24
  • 99.150.16.0/21
  • 99.151.188.0/23
  • 99.77.136.0/24
  • 99.77.158.0/24
  • 99.77.247.0/24
  • 99.78.156.0/22
  • 99.78.160.0/21
  • 99.78.168.0/23
  • 99.82.163.0/24
  • 99.83.99.0/24

Related Articles

GlobalSign System Alerts

View recent system alerts.

View Alerts

Atlas Discovery

Scan your endpoints to locate all of your Certificates.

Sign Up

SSL Configuration Test

Check your certificate installation for SSL issues and vulnerabilities.

Contact Support