A scan for:
- Networks
- Configurations
- Software
- Hardware for vulnerabilities.
Scan Types
Non-Credential
A scan that operates with restricted privileges. Available to attackers aswell.
Credentialed
A scan that has elevated privileges. Can see documents, certificates, account information and software details.
Features
- Can reveal outdated software
- Can reveal misconfigurations
- Can categorize vulnerabilities by using Common Vulnerability Scoring System
- Can continuously monitor