Secret Scan FAQ's

Secret Scan FAQ's


  1. What is the maximum file size that we can scan? 

By default, it is 16 KB. You can set the maximum file size by using the flag "Max_secret_scan_size".

           

  1. Is the file locked or unavailable for other applications during the scan? 

Yes, on Windows, the file will be locked for a brief duration while its contents are loaded in memory. On Linux and MacOS, the file will not be locked. 


  1. As part of secret scanning, what do we check for?

  • Public / Private keys - the secrets look for patterns that are in common public and private key formats.

  1. Does the sensor scan one file after another?
    Yes, the sensor crawls the whole disk and scans files one after another. 


  1. How much CPU will this scan consume?

Maximum CPU is 5% but it can be configured to any value above 1%.  CPU limit can be configured using the flag disk_scan_cpu_percent


  1. Do we also scan encrypted files?


No.


  1. Do we scan running log files?
    If a log file is below the scan size at the time of scanning, it will be scanned once during the scan iteration. Changes made to log files can be monitored via FIM but we do not look for secrets in content being added to log files. 


  1. When we are scanning all the paths for secrets, what exactly is the significance of additional scan mount types? (example: ext4)
    Normally while looking for secrets, we give the choice of looking at root partition mounted disk or other disks mounted as NFS, docker layover, etc filesystems. 


  1. If the asset goes offline in between, will it scan again after it comes online from where it left? Yes, it starts in the same folder where it was left. 


  1. What happens if the file is deleted during the scan?
    If the file is deleted before its contents are read in memory, it will not be scanned.










    • Related Articles

    • Difference Between Disk Scan and Malware Scan

      Introduction This document provides a comprehensive understanding of the differences between Disk Scan and Malware Scan in Uptycs. Both scans serve different purposes and operate using distinct methodologies. Malware Scan Overview A Malware Scan ...
    • How to obtain an API Key

      Overview An API key & secret are used to authenticate API clients to access Uptycs related resources. An API key / secret is unique to individual users. The document describes the process to obtain the same on Uptycs eco-system. Procedure Login into ...
    • TimeZones in the UI and API

      This FAQ clarifies how timezones are handled within the UI and API. Time displayed in the UI: All configuration items within the UI will be displayed in your local time. This ensures you see familiar time formats while configuring rules and ...
    • What is the SUNBURST Backdoor Intrusion and How Can I detect it?

      Overview What is the SUNBURST backdoor intrusion and how can I detect it? FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware called SUNBURST. This intrusion campaign is ...
    • Software Catalog Q&A

      Software Catalog Q&A 1)Which type of System will be applicable? A)It will be catalog only for Server workloads and systems which have processes running longer than 6 hrs. 2)What is the frequency of cataloging? A)12 Hrs 3)Can we Change the frequency ...