Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Automatically Fix Your Network Vulnerabilities: Page 11 of 12

Use the information stored in VA results for risk assessment, asset identification, and management. By scanning the entire network on a regular basis, you can identify the type and quantity of OSs, hardware, and applications. This information is useful when doing a risk assessment of a new vulnerability or exploit.

Establish naming conventions for devices, group names, report names, and so on. Scans make more sense when devices have understandable names.

Scan key critical assets many times per week, depending on your level of concern. Many companies scan DMZ and key infrastructure components three or more times per week.


Risk Assessment: Vulnerability Assessment