Vulnerability assessment

The vulnerability assessment process consists of the following steps:

  1. You create a protection plan with the enabled vulnerability assessment module, specify the Vulnerability assessment settings, and assign the plan to machines.
  2. The system, by schedule or on demand, sends a command to run the vulnerability assessment scanning to the protection agents installed on machines.
  3. The agents get the command, start scanning machines for vulnerabilities, and generate the scanning activity.
  4. After the vulnerability assessment scanning is completed, the agents generate the results and send them to the monitoring service.
  5. The monitoring service processes the data from the agents and shows the results in the vulnerability assessment widgets and list of found vulnerabilities.
  6. When you get a list of found vulnerabilities, you can process it and decide which of the found vulnerabilities must be fixed.

You can monitor the results of the vulnerability assessment scanning in Monitoring> Overview > Vulnerabilities / Existing vulnerabilities widgets.