Vulnerability assessment

The vulnerability assessment process consists of the following steps:

  1. You create a protection plan with enabled Vulnerability assessment module, specify the vulnerability assessment settings, and assign the plan to machines.
  2. The system, by schedule or on demand, sends a command to the protection agents to run the vulnerability assessment scanning.
  3. The agents receive the command, start scanning machines for vulnerabilities, and generate the scanning activity.
  4. After the vulnerability assessment scanning completes, the agents generate the results and send them to Monitoring Service.
  5. Monitoring Service processes the data from the agents and shows the results in the vulnerability assessment widgets and a list of found vulnerabilities.
  6. By using this information, you can decide which of the found vulnerabilities must be fixed.

You can monitor the results of the vulnerability assessment scanning in Dashboard > Overview > Vulnerabilities / Existing vulnerabilities widgets.