Vulnerability assessment
The vulnerability assessment process consists of the following steps:
- You create a protection plan with enabled Vulnerability assessment module, specify the vulnerability assessment settings, and assign the plan to machines.
- The system, by schedule or on demand, sends a command to the protection agents to run the vulnerability assessment scanning.
- The agents receive the command, start scanning machines for vulnerabilities, and generate the scanning activity.
- After the vulnerability assessment scanning completes, the agents generate the results and send them to Monitoring Service.
- Monitoring Service processes the data from the agents and shows the results in the vulnerability assessment widgets and a list of found vulnerabilities.
- By using this information, you can decide which of the found vulnerabilities must be fixed.
You can monitor the results of the vulnerability assessment scanning in Dashboard > Overview > Vulnerabilities / Existing vulnerabilities widgets.