FAQ

Client software
If you need to install an agent on a (new) server  or other asset or update the agent software, you can use the following links to download the latest versi...
Sat, 16 Jan, 2021 at 1:37 PM
How can I check whether Skopos works?
Linux You can check the log files on Linux via:     journalctl |grep skopos or     cat /var/log/syslog|grep skopos On Windows you can check the event...
Thu, 7 Jan, 2021 at 8:14 AM
How can I uninstall Skopos on Linux?
If you installed the Skopos Client using the generic installation script, follow these steps: 1. Use the uninstall script located in the directory where...
Mon, 3 Feb, 2020 at 1:52 PM
What is SKES (SKopos Exploit Score)
SKES: SKopos Exploitability Score This is a more technical introduction to how Skopos does the scoring.   At Skopos we believe the context of a vulnerabi...
Tue, 5 Oct, 2021 at 6:12 PM
How can I check the version of a Skopos client
In the "November 2019" release command line options to get the client versions were added. sudo /opt/skopos/skopos_client.sh --version For Wi...
Thu, 7 Jan, 2021 at 8:14 AM
How can I manually execute the Skopos agent and push data
For Linux clients you can open a terminal and execute the following command: sudo -u skopos /opt/skopos/skopos_client.sh For Windows you must open cmd....
Thu, 7 Jan, 2021 at 8:14 AM
Security principles we live by
We are open about our security controls, so if you'd like to know more, please let us know.  Our focus can be split up in agents running on end points...
Fri, 29 Jan, 2021 at 2:19 PM
Can you manually start the Network Scanner?
How can I manually start the Network Scanner? Please read this article if you want to know how to configure and set up the Networkscanner https://skopos...
Wed, 16 Jun, 2021 at 5:42 PM
Notification settings
We recognize that notifications can be really helpful, but can also get annoying. In the settings you have control over which notification you'll recei...
Wed, 6 Oct, 2021 at 4:07 PM
How does Skopos measure Cyber Security Risk
Introduction Skopos takes a holistic approach to cyber security.  What does that mean? Companies can be attacked via two ways: directly on employees, ...
Wed, 6 Oct, 2021 at 1:31 PM