You may also like
Reading Time: 2 minutes From Vulnerability Assessment, click on Configure | Targets to go to the page where you’ll be able to define a target representing […]
Reading Time: 2 minutes Click on Configure | Alerts to go to the section where you’ll be able to define an email representing the person who […]
Reading Time: < 1 minute Revision 1.0.0 – (10-28-2019) Vulnerability Management Service is a core service required to protect your critical business systems from compromise. The […]
Reading Time: 2 minutes Now, we need to configure a schedule so that we can use it to automate the scan process. Click on Configure | […]