Thousands of MSPs are exposed on the Internet and don’t know it.
Because of their visible nature, MSP tools are often easy targets for attackers. By searching for a single popular RMM tool in Shodan, you can find 7,000+ MSPs. The risk of a zero-day attack increases significantly with this level of surface exposure.
To help MSPs combat this and protect themselves, we’ve created our MSP Tool Security Scanner. Trusted by hundreds of MSPs, our scanner provides actionable results regarding security misconfigurations and missing best practices in minutes.
As an additional value, anyone who uses our security scanner will also get an e-mail course on protecting MSP tools.
It might seem simple, but firewall configuration can drift over time -- especially after migration projects. Our scanner performs a best-practice check of open ports, verifying that ports used for database access or remote administration are properly closed.
Strong cryptography is important for security, as well as meeting insurance and compliance requirements. Our server scanner reports on the available TLS versions to ensure that only modern and secure cipher suites are in use.
HTTP headers control how clients interact with the server and are often overlooked in security hardening. Our scanner performs a gap report on headers that should be added and removed for proper security posture.
Enumeration is the first stage of a cyberattack, and ideally, where you want to stop one. Our scanner performs standard enumeration checks to determine potential areas of concern.
The scanner receives the FQDN of an MSP tool and performs the following checks:
Yes. All the background data transmission between the scanner components uses TLS encryption. Additionally, the scanner retains no record of the scan results (see “What happens to my data?” below).
Results are only shown on the results page — the scan results are not stored. The only data retained is what you enter into the form (to prevent abuse/spam, etc.).
Below is a sample output from a ConnectWise Automate server.
Overall Rating: F
|
Your server scored 36/100 |
FQDN: automate.REDACTED.com |
IP Address: 52.X.X.X |
Status: up |
Port 80 is closed.
|
Port 443 is open; secure communication supported!
|
Port 3306 (MySQL) appears closed.
|
... |
SSL 3.0 is disabled.
|
TLS 1.0 is enabled - DANGER! TLS 1.0 contains major vulnerabilities dating back to 2011!
|
TLS 1.2 is enabled.
|
... |
X-Powered-By HTTP header is present - this can be used to fingerprint the server!
|
X-AspNetMvc-Version HTTP header is absent.
|
X-Robots-Tag HTTP header is absent or set incorrectly - this server could be enumerated by search engines!
|
... |
GeoIP restrictions do not appear present; server is reachable from India!
|
This server is visible in Google!
|
This server is visible in Shodan! This makes it an easy target for large-scale attacks!
|
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |