DETECTION OVERVIEW
Risk Factors
A user-agent string that appears in HTTP and other protocol headers can identify software running on a client. Certain types of pen testing software perform scans that can be identified by a user agent (UA). Authorized scans will not damage an application, but unauthorized scans should be investigated.
Kill Chain
Risk Score
41
N/A
Quarantine devices with unexpected scanning activity to prevent further network access
Implement network segmentation, security zones, and firewall policies that limit how devices can communicate
Disable services that are not required and close unnecessary ports