
Typically, you use Vulnerability Assessment to quickly identify the security risks to your network and eliminate the identified vulnerabilities. After this procedure, you have established a baseline security for the network. Now your major concern is how to maintain the baseline network security.
Use the following features to maintain a baseline security:
Scheduled tasks. Create and run scheduled tasks to regularly check for new vulnerabilities.
Task histories. View task histories to discover new vulnerabilities as they occur and measure the progress of your countermeasures.
Queries and reports. Creating custom queries and generate reports. Better understand the nature of the security risks on your network.