DETECTION OVERVIEW
Risk Factors
A user-agent string that appears in HTTP and other protocol headers can identify software running on a client. Certain types of pen testing software perform scans that can be identified by a user agent (UA). These scans do not negatively affect network performance, but they can enable attackers to discover vulnerabilities on a web server.
Kill Chain
Risk Score
60
N/A
Block inbound and outbound traffic from public scanner suspicious IP addresses at the network perimeter
Implement network segmentation, security zones, and firewall policies that limit how devices can communicate
Disable services that are not required and close unnecessary ports