A scan for:

  • Networks
  • Configurations
  • Software
  • Hardware for vulnerabilities.

Scan Types

Non-Credential

A scan that operates with restricted privileges. Available to attackers aswell.

Credentialed

A scan that has elevated privileges. Can see documents, certificates, account information and software details.

Features

Scanner Tools