FAQ
Frequently Asked Questions
FAQ
- Does KYND do any aggressive port scanning?
- Signals Portfolio Report Migration FAQ
- My report has flagged an exposed database. What do you mean?
- How has KYND found these results?
- Proactive Vulnerability Scanning - An Explainer
- How did you perform a scan if I didn't give you a list of IPs?
- An email from our organisation is connecting an unrelated domain into our results
- The vulnerabilities you found are managed by a third party and not within my control.
- KYND has discovered a vulnerability that is registered under a former employee/IT provider name, or is no longer in use.
- KYND has flagged a load balancing port as a vulnerability
- I have a WAF in place. Is that an acceptable reason for ports to be open?
- A vulnerability in the report is behind a VPN. Does this resolve the issue?
- KYND has identified a vulnerability located in a DMZ. Is that secure?
- Why has KYND flagged a developer access port as a risk?
- I have patched the services on my developer access port, why is KYND still flagging it as out of date?
- An open RDP port that's been found in the KYND report is being actively monitored. Is that secure?
- The vulnerability discovered by KYND is always disabled, so is it a risk?
- I have MFA enabled. Is that an acceptable resolution to the vulnerabilities highlighted in the report?
- The ports identified by KYND are filtered. Are they still a risk?
- My honeypot port has been flagged by KYND.
- Why does KYND flag End of Life Microsoft services?
- I can't close or hide the port identified in my SIGNALS report. What should I do?
Understanding Your RAGs (Red Amber Green)
- What is a Red, Amber, or Green risk?
- IP Address Risks: IP Address Risks: Bruteforce
- IP Address Risks: Comand and Control (C2) Servers
- IP Address Risks: Darknet Scanning
- IP Address Risks: Honeypot interactions
- IP Address Risks: Open Resolvers
- IP Address Risks: Phishing
- IP Address Risks: Proxy Services
- IP Address Risks: Scanning Networks
- IP Address Risks: Spam Emails
- IP Address Risks: Bots
- Service Risks: What are ‘Service Risks' and why should I be concerned?
- Certificate Risks: What are ‘Certificate Risks'?
- Certificate Risks: Why expiring certificates are a security issue.
- Domain Risks: Suppressing unconnected domains
- Domain Risks: What are ‘Domain Security' risks?
- Domain Risks: KYND Domain discovery and domains related risks
- Email Risks: What are "Email Security" risks?
- Email Risks: What are ‘Phishing & Malware’ risks?
- Email Risks: Invalid DKIM Records
- Email Risks: Implementing DKIM
- Email Risks: Introduction to DKIM
- Email Risks: Implementing SPF
- Email Risks: Introduction to SPF
- Email Risks: Introduction to DMARC
- Email Risks: Implementing DMARC