NSM – Vulnerability Assessment

6 posts

Configure Tasks

Reading Time: 2 minutes Finally, we need to configure a task that will associate all previous configurations in order to automate the scan on the subnet we want to analyze and report the result to the recipient email address. To do this, go to Scan | Tasks. On the Tasks section, click on the star icon at the upper […]

Configure Schedules

Reading Time: 2 minutes Now, we need to configure a schedule so that we can use it to automate the scan process. Click on Configure | Schedules to go to the section where you’ll be able to define a schedule for the scan. From the Schedules section, click on the star icon at the upper left of the page. […]

Configure Alert

Reading Time: 2 minutes Click on Configure | Alerts to go to the section where you’ll be able to define an email representing the person who should receive the scan result. From the Alerts section, click on the star icon at the upper left of the page. This will open a window from where you can define a new […]

Configure Target

Reading Time: 2 minutes From Vulnerability Assessment, click on Configure | Targets to go to the page where you’ll be able to define a target representing the network you want to scan. From the Target section, click on the star icon at the upper left of the page. This will open a window from where you can define a […]

Connect

Reading Time: < 1 minute From the home page, click on the “Network Security Monitor” link. Click on the link called “Vulnerability Assessment” at the upper right of the page,