Full-scale deployment

As you get started with runZero, we recommend kicking off with our standard deployment plan and adding tasks as needed. The standard deployment plan is broken out into six stages which will help you plan out your requirements, execute the deployment, and optimize your environment based on runZero’s best practices.

1. Identify key success outcomes

Total attack surface visibility

Additional Resources

Full-spectrum exposure detection

Additional Resources

Risk prioritization and insights

Additional Resources

Compliance, Reporting, and KPIs

Additional Resources

2. Planning your deployment

This first set of tasks will help your team identify target results, get ahead of potential blockers, and help you avoid misconfigurations within runZero.

Tasks

  • Identify key organizational stakeholders
    • Administrator(s) - who will be setting up runZero?
    • Integration owner(s) - who will provide credentials for each integration?
  • All users take the runZero 101 training
  • Administrators take the runZero 201 training
  • Determine whether self-hosting is required (docs | video)
  • Determine if you will use SSO or local accounts for user access.
    • If SSO, you will want to start any internal processes for getting the runZero app created in your provider.
  • Identify known networks and subnets for discovery and other inventory sources. (docs | video)
    • If available, prepare CSV files for bulk importing subnets.
    • Firewalls should also be configured to allow the Explorer IPs to scan the entire network on all ports.
  • Define organizations based on RBAC requirements, including configuring organization-level data retention and expiration thresholds (docs | video).
  • Determine Explorer deployment location(s).
    • Explorer Groups can be used to logically combine Explorers for streamlined task scheduling.
  • Identify required inbound integrations, prioritizing connectors for platforms such as EDR and CSPM to get full vulnerability and misconfiguration coverage.
  • Familiarize the team with the runZero search to plan initial asset searches and reporting requirements.

3. Initial configuration

Once you have your plan in place, it’s time to execute and run your initial scans. Please note that these configuration tasks are in a prioritized order to help you avoid having to reconfigure things down the road.

Tasks

4. Review Assets and Exposures

Now that you have done some initial discovery and leveraged integrations, it’s time to review the results. Reviewing the results and leveraging our advanced reporting features will help you expand scan scope, prioritize risk, better understand your network, and identify key exposure issues such as misconfigurations and actively exploited vulnerabilities.

Tasks

  • Review Results and Exposure Overview

    • Review the Risk Management Dashboard (new default dashboard) for a centralized view of risks. This dashboard provides insights, trend data, and breakdowns of assets (docs).
      • Check the Latest Rapid Response alerts widget, which includes a carousel of the five most recent Rapid Response posts and displays matches in your inventory (docs).
      • Leverage the capability to create and share multiple, custom dashboards for different use cases or teams (e.g., Compliance or Vulnerability Management) (docs).
    • Review the Asset Inventory (docs). The inventory correlates and merges assets across all data sources (scan, passive, and integrations) to provide a single source of truth.
    • Review the Asset Detail View, noting the consolidated view of attributes, vulnerabilities, and software (docs).
  • Identify and Prioritize Exposures with Findings

    • Review the Findings section, which aggregates vulnerabilities and misconfigurations into prioritized risk categories (e.g., Internet Exposure, Open Access, End-of-Life, Certificates, Vulnerability, and Best Practice Violations) (docs).
  • Deep Investigation and Querying

    • Identify risky assets using the Queries library (docs):
      • Learn query syntax (docs).
      • Apply vulnerability records to queries (e.g., for novel internal findings) (docs).
      • Filter assets and services directly by their associated Finding Code (e.g., finding_code:rz-finding-internet-exposed-database) to target remediation (docs).
      • Search for assets exposed to Known Exploited Vulnerabilities (KEV) lists (CISA KEV, VulnCheck) and leverage EPSS scores for priority assessment.
  • Track Long-Term Initiatives

    • Track long-term initiatives with Goals (docs).
    • Utilize Baseline Goals to measure progress against specific inventory subsets (e.g., setting a goal to remediate all expired certificates or critical vulnerabilities in the os_eol:<now subset).
  • Review Reporting

    • Review reports (docs).
    • Identify gaps in scanning uisng reports (docs).
    • Understand network segmentation (docs).

5. Optimization

After you’ve done your initial analysis, you will want to optimize your scans and configurations to follow best practices.

Tasks

  • Configure SNMP credentials (video)
  • Optimize scans by adjusting scan rates and other configurations (docs | video)
    • See our clickthrough of some key additional configuration options as well
  • Ensure default credential and vulnerability checks are enabled on all scans.
  • Configure asset ownership to streamline investigations.

6. Automation

Now that you have optimized your scans and have analyzed your runZero data, you can automate these tasks to avoid manual effort. You can leverage this automation to run scans on a recurring basis, automate queries, and generate alerting for the team.

Tasks

7. Rollout

As your runZero deployment comes to a close, you will want to ensure all users have gone through training and ensure anyone that would get value from runZero has access to the platform.

Tasks

  • Add users
  • Ensure all users are trained on runZero
  • Identify other teams interested in the asset inventory data, such as:
    • Enterprise security team
      • runZero is typically used by security teams to achieve a complete asset inventory, find gaps in their vulnerability scanning and endpoint protection, as well as discover potential vulnerabilities.
    • IT Operations team
      • runZero is typically used by IT Operations teams to achieve a complete inventory of all assets across on-premise and cloud-based infrastructure. This allows the team to identify misconfigurations as well as report on assets in the environment by leveraging our searching and reporting capabilities.
    • Penetration testing team
      • runZero is typically used by penetration testing teams for conducting reconnaissance both internally and externally, identifying vulnerable targets, and finding ways to get to these vulnerable targets by using our reporting and searching capabilities.

Additional Resources

Now that runZero has been deployed and users have been trained on the platform, please review some of our additional resources to help answer questions you might have as well as maximize the value of runZero:

Getting help

If you need assistance at any point in this process, you can book a session with a runZero Customer Success Engineer to discuss further.

Updated