You may also like
Reading Time: < 1 minute Revision 1.0.0 – (10-28-2019) Vulnerability Management Service is a core service required to protect your critical business systems from compromise. The […]
Reading Time: 2 minutes Click on Configure | Alerts to go to the section where you’ll be able to define an email representing the person who […]
Reading Time: 2 minutes Finally, we need to configure a task that will associate all previous configurations in order to automate the scan on the subnet […]
Reading Time: 2 minutes Now, we need to configure a schedule so that we can use it to automate the scan process. Click on Configure | […]