Blog, Lansweeper Blog
Active Scanning: Detailed Asset Data in Seconds | Lansweeper
Active Scanning: Detailed Asset Data in Seconds
This article was originally published by LOGON’s partner Lansweeper. Click here to view the original article.

What is Active Scanning?
Active scanning is a scanning method whereby you scan individual endpoints in an IT network for the purpose of retrieving more detailed information. With active scanning, you send packets or queries directly to specific assets rather than passively collecting that data by “catching” it in transit on the network’s traffic. Simply put, active scanning is an immediate deep scan, done on selected targets, to get very detailed information. These targets can be single devices or groups of devices.
Why use Active Scanning?
Active scanning is performed to identify, track, and manage IT or OT assets. Aside from basic asset information, it also collects detailed data like patch levels, installed software info, user info, etc. It is useful for many different use cases, including vulnerability assessments, compliance audits, and other tasks related to ITAM and SAM. For example, a device that has not been updated in a while or is being accessed by someone who should not have access. These scans are therefore ideal to help investigate assets & increase a network’s cybersecurity.
What is Passive Scanning?
Passive scanning is a scanning method that continuously scans an entire network for the purpose of monitoring all connected devices at the same time. In doing so it only gathers basic asset information that it intercepts in the network traffic. The fact that it monitors continuously makes passive scanning also very useful for cybersecurity reasons, as it can, for example, instantly detect rogue devices.
Active vs. Passive Scanning
A question that sometimes pops up is whether you should use active scanning or passive scanning. Active scanning has unlimited reach, it scans on-demand at certain predefined intervals and it can scan devices that require certain integrations, like Airwatch, Intune, ChromeOS, SCCM, and more. This also means that active network scanning takes more time to set up, is slower to run, and requires more resources than passive scanning. As a result, it is possible for rogue devices to slip through between active scans. In contrast, a passive scan continuously scans the network traffic and picks up data as it passes through. This means that it can pick up rogue devices more easily than an active scan. However, passive scanning retrieves less detailed information about your assets because it only performs credential-less scans.

But because of their differences, they complement each other well. Therefore, most IT managers combine both scanning methods to get a complete overview of their IT estate.
Active and Passive Scanning with Lansweeper
With Lansweeper you do not have to choose between active or passive scanning. Our software combines both into one solution. Lansweeper passive scans are made possible by Asset Radar. This Lansweeper passive scanning feature provides you with basic, real-time information about all the assets on your network. And using only the MAC/IP address, Lansweeper can retrieve more information from passive scans than conventional scanners thanks to its Credential-Free Device Recognition (CDR) technology. CDR detects and recognizes every device on your network – even non-scannable devices – without the need for credentials or complex pre-configurations. And at any time you want, you can perform an agentless follow-up active deep scan with credentials to get all the detailed hardware, software, and user data you want from your assets. Simply put, Lansweeper offers unmatched visibility of your entire IT estate.
The Benefits of Active Scanning with Lansweeper
- You get both active scanning and passive scanning.
- You can work agentless.
- You can work credential free.
- You can schedule automatic scans.
- You can be automatically alerted of scan results.
- You can browse over 500 built-in scan reports.
- You can try Lansweeper for free.
Related posts
Bfore.AI Blog, Blog
What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
Originally published by Bfore.AI. Security professionals need strong support from smart machines and advanced technologies like AI to work successfully and protect their organizations from cyber attacks. This article looks at the benefits and potential of integrating AI with cybersecurity.
Blog, Reflectiz Blog
Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
Originally published by Reflectiz. Much of the effort to secure APIs should concentrate on the most common vulnerabilities that consistently lead to breaches, stolen data, and other adverse outcomes, including financial costs to your business. Let’s look at the top five API vulnerabilities, their implications, real-world examples, and mitigation tips.
Blog, Reflectiz Blog
The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
Originally published by Reflectiz. The recently exposed SolarWinds supply chain attack is one of the biggest cybersecurity events in recent memory. It created a ripple effect that will be felt for years to come on a global scale. Third-party security will never be the same again after this mega-breach, which affected some of the biggest Fortune 500 companies and US government entities. Let’s dive into the details.
Bfore.AI Blog, Blog
[SCAM ALERT 035] -AmericaFirst | Bfore.AI
Originally published by Bfore.AI. During Bfore.AI PreCrime internet scout of 15 July 2022. they have identified suspicious markers across multiple vectors. One of those was this website spoof that could be targeting unsuspecting bank clients.
Bfore.AI Blog, Blog
Managing cyber risks related to remote working | Bfore.AI
Originally published by Bfore.AI. By implementing a number of practical training, process and technology measures, companies can avoid adding a cyber crisis to the challenges associated with telecommuting and COVID-19. Follow these 7 steps to help protect your assets.
Comments are closed
FOLLOW US ON