Scan Management

Overview

Scan Management controls Oju’s automated monitoring capabilities. Configure scan types, adjust detection criteria, and manage monitoring frequencies to ensure comprehensive security coverage for your entities and platforms.

Available Scan Types

all scan
Figure 1. Available scan overview

SSL Certificate Monitoring

Purpose: Monitor SSL certificate and validity

Configuration Options:

  • SSL Error Checking - Enable/disable SSL validation

  • Expiry Monitoring - Toggle expiration warnings

ssl scan
Figure 2. Ssl scan

Domain Availability Scanning

Purpose: Monitor domain registration and DNS resolution

Configuration Options:

  • WHOIS Checking - Enable WHOIS for domain registration monitoring

  • DNS Server Validation - Test with configured DNS servers

  • Expiry Alerts - Monitor domain renewal dates

domain scan
Figure 3. Domain scan

Defacement Detection

Purpose: Detect unauthorized website content changes

Configuration Options:

  • Acceptance Rate - Size change tolerance (bytes)

  • Whitelisted Domains - Trusted domains to ignore

defacement capture
Figure 4. Defacement scan

Website Availability Monitoring

Purpose: Monitor website accessibility

Configuration Options:

  • Max Response Time - Acceptable response threshold

website scan
Figure 5. Website scan

Scan Configuration

Activating Scans

  1. Navigate to Scan Management

  2. Select scan type to configure

  3. Click Toggle Status to enable/disable

  4. Configure scan-specific criteria

  5. Save changes to apply

Monitoring Automation

Scan Scheduling

Automatic Execution:

  • Scans run based on configured frequency

  • System manages scan distribution

  • Celery task queue handles execution

Frequency Control:

  • Configured in system settings

  • Applies to all active scan types

  • Adjustable based on requirements

Scan Coordination

System Integration:

  • Scans coordinate with platform status

  • Only active platforms included

  • Results feed alert generation system

Resource Management:

  • Worker limits prevent overload

  • Proxy rotation for external checks

  • Cache management for efficiency

Effective scan management ensures comprehensive monitoring coverage while maintaining system performance and reliability.