Frequently Asked Questions
Absolutely. The new version includes many new improvements such as the automatic upgrades when a new version is released. Visit the following post on our blog to learn more about the new version: IKare New Release.
ITrust provides a User Guide for the complete installation process with each purchased license or trial version.
IKare is provided as a virtual appliance, with its own dedicated operating system. Therefore, IKare is not a software. IKare is provided in .ISO and .OVF formats, compatible with standard virtualization tools such as VMware, HyperV, VirtualBox… and may be installed on specific environments compatible with such technologies.
IKare has been designed to minimize both scan duration and use of network bandwidth. Therefore, its impact on the network is minimal. More so, if IKare detects a deterioration in network performance while scanning, it automatically reduces the scanning speed.
We advice to audit the network during periods of inactivity (the night, for example).
Virtual groups allow IT managers to divide a network into segments in order to facilitate operations.
When you define groups, it is important to keep in mind the notion of inheritance. The IP range of the sub-groups has to be included in the IP range of main group. Sub-groups inherit the parameters of the main group. You are only allowed to change their values in order to make them more restrictive (less timeslots or lower scan frequency).
You can watch the introduction video of IKare for an optimal use of the product.
You may decide what assets to audit and the timeslots when scans can be performed. You also may set the number of parallel scans and the comprehensiveness (i.e. number of ports audited).
The reports are exported in PDF, CSV and XML.
As designed, IKare uses Nmap for discovery and port auditing. Nmap is an essential part of the solution and cannot be removed.
However, you may contact the sales team for a specific development that could replace this element or another.
3. Vulnerability audits
Network discovery consists in identifying all the assets included in the network (e.g. workstations, laptops, servers, printers…), the open ports and the applications running on those assets.
IKare scans more than 33000 vulnerabilities on hundreds of applications and operating systems.
IKare classifies vulnerabilities according to their criticality (grading them). It also offers information on how to mitigate or remediate the weaknesses found. IKare’s reports can be customized and adapted to one’s profile through the user account administration.
Authenticated scan enables IKare to connect to workstations/servers as a user so as to get more information, for instance non-exposed services, to establish a comprehensive listing of system vulnerabilities.
For Microsoft environments, the connexion uses WMI protocol and the domain account enables to read register bases.
For Unix environments, the connexion uses SSH protocol and the user may read the list of installed packages (depending on the version: rpm, dpkg…).
Yes, IKare is based on the international standard CVSS V2 base score.
Without WMI (or SSH), IKare detects the vulnerabilities within exposed services and visible within the network.
In most cases, IKare finds the service name and its version.
If there is a reverse name resolution, the machine will be identified by its DNS name (and soon in NETBIOS).
IKare does not integrate with MBSA. Microsoft vulnerabilities detected by IKare come from security checks that do not use MBSA.
You can report errors or bugs at support(at)itrust.fr.
EULA is displayed during IKare’s first-installation and will soon be available on this website.
Yes, IKare is designed and marketed by ITrust.
Yes, as a MSP, you can provide IKare to your customers by using a classic license or as a service (cloud-based scanning).
In its current version, IKare doesn’t allow to customize reports. This feature will be available in upcoming releases.