Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Automatically Fix Your Network Vulnerabilities: Page 10 of 12

Perform both internal and perimeter scans to develop a complete picture of the network. Internal scans are more comprehensive, but perimeter scans will help to determine what information can be extracted by untrusted systems and individuals.

Distribute scanners across key WAN links. A good rule of thumb is to sit appliances at sites with more than 500 active IP devices.

Don't try to fix all issues at once. Start with the most critical, such as vulnerabilities that can give local system access to the remote attacker. While the vendor vulnerability-severity ratings are a good start, security analysts earn their pay by deciding which vulnerabilities to focus on.

Some systems will fail or react poorly during a scan, but avoid the temptation to shut down the scans altogether. The fact that a system reacted poorly to the scan indicates vulnerability.

When faced with a critical situation such as a release of a new exploit, scan specifically for that vulnerability. Don't waste time with general scans.