DeepSurface: Credentials

Documentation
Installation Guide
Overview
Let DeepSurface Host For You
Getting Started
System Requirements
Self Hosted Quick Start - Installing to Cloud Platforms
Self Hosted - Installation Using an OVA
Registration, Package Installation, and Initialization
First Steps After Initialization of the Console
Deployment Options
Main and Subordinate Consoles
Agent-Based Deployment
User Managed Scan Deployment
Credentialed Scanning Deployment
Mixed Environment
Deployment Tools
Active Directory Group Policy
Microsoft Endpoint Configuration Manager (part of InTune)
Tanium Deploy
HCL BigFix
Ivanti
Virtual Machines
VMWare
Virtual Box
VirtualBox Guest Additions
AWS EC2 (BYOL)
AWS EC2 (Usage Based)
Azure Cloud
Google Cloud
Additional Items to Consider
Main Console Server Certificates
LDAP
TOFU
Clock Sync
DeepSurface Commands
Multiple Vulnerability Sources
API Documentation
User Guide
Reporting
Dashboards
Exports
Risk Insight
Hosts
Patches
Vulnerabilities
Vulnerability Instances
Users
Remediation Workflow Manager
Plans
Settings
Integrations
Workflow
Exporting
Accepted Risk Plans
Accepted Risk Workflow
Explore
Model
Paths
Activity
Tasks
Configuration Alerts
Scan Logs
Notification Settings
Scanning
Status
Agents
User Managed
Credentialed Scanning Settings
Credentials
Scan Groups
General Settings
Cloud Scanning
Network Connectivity
Subordinates
Vulnerability Sources
Setup
Sensitive Assets: Polices
Sensitive Assets: Manual
Admin Settings
SMTP Settings
Certificates
Outbound Proxy
Authentication Providers
Users
Tags
Integrations Guide
Vulnerability Sources
CrowdStrike Spotlight
SentinelOne
Carbon Black Cloud
Microsoft Defender for Endpoint
Wazuh
Lansweeper Cloud
Nessus API
Tenable.io API
Security Center/Tenable.sc API
Rapid7 InsightVM API
Qualys API
Nozomi Guardian
Eclypsium
AWS Inspector
Remediation
Jira Software
Tanium (BETA)
Authentication Providers
LDAP (Active Directory)
SAML (Azure Active Directory)
SAML (Google)
SAML (Okta)
PAM
CyberArk
Delinea (Thycotic)
Microsoft LAPS
Security Guide
Firewall Configuration
Base Network Requirements
Agent Network Requirements
Credentialed Scanning Network Requirements
API Network Requirements
How DeepSurface Scans Work
Domain (LDAP) Scanning
Host Scanning Routine
Reasons for the Administrative Access Requirement
Endpoint Protection Considerations
Other Items
Scope of Data Storage and Retention
IPS/IDS Considerations
Logging
Resetting the DSADMIN password
Product Information
Changelogs
Open source Licenses
End User License Agreement (EULA)

WIN protocols

In order for credentialed scanning to work, DeepSurface needs to have access to the machines in your environment and they can all be configured and managed in one place in the application. The credentials interface is crucial for credentialed scanning to work at all, and without valid creds, DeepSurface cannot give accurate results.

DeepSurface has rich support for a variety of different credential types/protocols and privileged access management (PAM) systems. This section of the documentation will go over the the general ways to configure credentials and how to set their priorities, but we also offer full documentation on different PAM options as well in great detail here.

The different PAM options that are available at this time are:

The different protocols that DeepSurface supports at this time are:

NOTE: SMB is still technically supported but has been deprecated in favor of the other protocols and it is not advised to configure this method.

For each protocol + PAM combination, the form changes to accomodate what information DeepSurface will need to utilize that method. Some combinations are quite simple, and others are quite complicated. For each method, the form itself includes contextual help links next to each field. Users can also refer to this documentation and specific documentation for each PAM method listed above. We will cover some of the combinations below:

SMB/WMI, WinRM (Powershell Remoting), and SMB

The simplest credentials to configure are the 3 windows methods that do not use a PAM (although they also work with any of the PAMs as well). For any of these methods, DeepSurface just needs a username and password as well as an optional domain if your systems are configured to need one. The forms for these three methods are all the same and look something like the following:

WIN protocols

SSH Password and SSH Private Key

For authenticating into linux machines, DeepSurface offers both SSH Password and SSH Private Key methods. For either method, add credentials to the necessary fields. For either approach, you can enter a sudo elevation method. From there, it is possible to then provide an additional password if necessary for sudo access.

SSH protocols

Credentials + PAM

It is possible to use any of the credential protocols in combination with supported PAM types. To add a PAM to a credential, simply select the PAM from the PAM Type dropdown in the left column of the form. The available PAM types to choose from will depend on the protocol method you are trying to use. For more detailed documentation on how to configure a specific PAM, read our detailed documentation on each type here.

Credential Hierarchy

One important concept to understand is that credentials will be used by our credentialed scanner while running a scan. A scan can be configured by designating a Scan Group (covered in the next section here), and assigning a given credential or set of credentials for that scan group to use to attempt to authenticate into machines on your network. When attempting authentication during a scan, DeepSurface will try one credential after another that you provide in order, until it has succesfully authenticated into a given box. Because of this, you can reorder the credentials by dragging and dropping them in the credentials interface so that certain credentials will always appear first in the list when creating or editing a scan group. A credential's order is clearly displayed in the interface.

Drag and drop

Credentials

WIN protocols

In order for credentialed scanning to work, DeepSurface needs to have access to the machines in your environment and they can all be configured and managed in one place in the application. The credentials interface is crucial for credentialed scanning to work at all, and without valid creds, DeepSurface cannot give accurate results.

DeepSurface has rich support for a variety of different credential types/protocols and privileged access management (PAM) systems. This section of the documentation will go over the the general ways to configure credentials and how to set their priorities, but we also offer full documentation on different PAM options as well in great detail here.

The different PAM options that are available at this time are:

The different protocols that DeepSurface supports at this time are:

  • SMB/WMI
  • WinRM (Powershell Remoting)
  • SSH Password
  • SSH Private Key
  • SMB (deprecated)

NOTE: SMB is still technically supported but has been deprecated in favor of the other protocols and it is not advised to configure this method.

For each protocol + PAM combination, the form changes to accomodate what information DeepSurface will need to utilize that method. Some combinations are quite simple, and others are quite complicated. For each method, the form itself includes contextual help links next to each field. Users can also refer to this documentation and specific documentation for each PAM method listed above. We will cover some of the combinations below:

SMB/WMI, WinRM (Powershell Remoting), and SMB

The simplest credentials to configure are the 3 windows methods that do not use a PAM (although they also work with any of the PAMs as well). For any of these methods, DeepSurface just needs a username and password as well as an optional domain if your systems are configured to need one. The forms for these three methods are all the same and look something like the following:

WIN protocols

SSH Password and SSH Private Key

For authenticating into linux machines, DeepSurface offers both SSH Password and SSH Private Key methods. For either method, add credentials to the necessary fields. For either approach, you can enter a sudo elevation method. From there, it is possible to then provide an additional password if necessary for sudo access.

SSH protocols

Credentials + PAM

It is possible to use any of the credential protocols in combination with supported PAM types. To add a PAM to a credential, simply select the PAM from the PAM Type dropdown in the left column of the form. The available PAM types to choose from will depend on the protocol method you are trying to use. For more detailed documentation on how to configure a specific PAM, read our detailed documentation on each type here.

Credential Hierarchy

One important concept to understand is that credentials will be used by our credentialed scanner while running a scan. A scan can be configured by designating a Scan Group (covered in the next section here), and assigning a given credential or set of credentials for that scan group to use to attempt to authenticate into machines on your network. When attempting authentication during a scan, DeepSurface will try one credential after another that you provide in order, until it has succesfully authenticated into a given box. Because of this, you can reorder the credentials by dragging and dropping them in the credentials interface so that certain credentials will always appear first in the list when creating or editing a scan group. A credential's order is clearly displayed in the interface.

Drag and drop