Vulnerability Assessment provides system administrators or other network security personnel with the ability to assess security risks to their networks. The information they generate by using Vulnerability Assessment gives them a clear guide as to how to resolve known vulnerabilities and secure their networks.
Use Vulnerability Assessment to:
Scan computers on your network for vulnerabilities.
Identify vulnerabilities according to standard naming conventions. Find out more about the vulnerability and how to resolve it by clicking on the vulnerability name.
Display the vulnerabilities by computer and IP address. Results include the risk level that the vulnerabilities represent to the computer and to the entire network.
Report vulnerabilities according to individual computers and describe the security risks those computers present to the overall network.
Configure tasks that scan any or all computers attached to a network. Scans can search for single vulnerabilities or a list of all known vulnerabilities.
Run manual assessment tasks or set tasks to run according to a schedule.
Request blocking for computers that present an unacceptable level of risk to network security.
Create reports that identify vulnerabilities according to individual computers and describe the security risks those computers present to the overall network. The reports identify the vulnerability according to standard naming conventions so that Administrators can research further to resolve the vulnerabilities and secure the network.
View assessment histories and compare reports to better understand the vulnerabilities and the changing risk factors to network security.