Reading Time: 2 minutes Finally, we need to configure a task that will associate all previous configurations in order to automate the scan on the subnet we want to analyze and report the result to the recipient email address. To do this, go to Scan | Tasks. On the Tasks section, click on the star icon at the upper […]
NSM – Vulnerability Assessment
Reading Time: 2 minutes Now, we need to configure a schedule so that we can use it to automate the scan process. Click on Configure | Schedules to go to the section where you’ll be able to define a schedule for the scan. From the Schedules section, click on the star icon at the upper left of the page. […]
Reading Time: 2 minutes Click on Configure | Alerts to go to the section where you’ll be able to define an email representing the person who should receive the scan result. From the Alerts section, click on the star icon at the upper left of the page. This will open a window from where you can define a new […]
Reading Time: 2 minutes From Vulnerability Assessment, click on Configure | Targets to go to the page where you’ll be able to define a target representing the network you want to scan. From the Target section, click on the star icon at the upper left of the page. This will open a window from where you can define a […]
Reading Time: < 1 minute From the home page, click on the “Network Security Monitor” link. Click on the link called “Vulnerability Assessment” at the upper right of the page,