Published 2026-04-25 · 8 min read

Agent vs agentless security scanning: which is right for your fleet?

Every vulnerability scanner is either agent-based, agentless, or hybrid. The architectural choice has knock-on effects on coverage, operational burden, and trust model. This post explains the real trade-offs — and why agentless wins for most homelab and small-fleet operators.

What "agent" and "agentless" actually mean

An agent-based scanner installs a long-running process on every host being scanned. The agent reads local state (installed packages, running services, kernel version) and reports back to a central server. CrowdStrike Falcon, Wazuh, Tenable Nessus Agent, and Pareto Security are agent-based.

An agentless scanner reaches into the host from outside — typically over SSH, sometimes over a cloud-provider API (AWS Inspector reads EC2 instance state from the AWS control plane). Lynis runs as a script you invoke, but its single-host reporting model is closer to agentless than agent-based — there's no daemon. Noxen is agentless over SSH.

Hybrid scanners support both modes. Tenable Nessus, Qualys, and most enterprise platforms are hybrid — agents for granular always-on monitoring, agentless for transient or hard-to-instrument hosts.

What an agent gives you (and what it costs)

Agents win on three dimensions:

The cost is operational:

The infamous CrowdStrike Falcon outage in July 2024 — the one where a config push bricked 8.5 million Windows hosts globally — is the agent-architecture risk made manifest. An agentless scanner cannot brick the hosts it's scanning, because it has no code running on them.

What agentless gives you (and what it costs)

Agentless wins on:

The cost is in coverage:

The trade-off, summarised

AgentAgentless
CoverageReal-time, kernel-deepSnapshot, user-land
Per-host installYes, every hostNo
Per-host updateYes, every hostNo
Resource costContinuousPer-scan only
Trust expansionNew privileged binaryReuses SSH keys
Failure blast radiusCan brick hostsCannot
Best forAlways-on detectionPeriodic posture checks

Which one is right for a homelab?

For a fleet of 5–50 homelab hosts, agentless almost always wins:

Pareto Security is a popular endpoint scanner and a worthy tool — but its architecture installs an agent on every device. For a homelab where you'd prefer not to run yet another always-on service on every Pi, an agentless scanner like Noxen is a better fit.

When you might want both

For real-time intrusion detection (process spawn, file change, network anomaly) you genuinely need an agent. The right combination for a serious homelab is:

Most homelabs only need the first. The second is only worth its operational cost if you're running things you wouldn't be embarrassed to defend in court.

What Noxen does

Noxen is a Mac-native agentless scanner. You add hosts via your existing ~/.ssh/config, and the app reads package inventory + runs network probes on every enrolled host nightly. No agent on any of your boxes. CVE matching against a signed feed sourced from VulnCheck NVD++ and OSV. $79 one-time at launch.