Vulnerability assessment

Vulnerability assessment (VA) is a process of identifying, quantifying, and prioritizing found vulnerabilities in the system. The vulnerability assessment module allows you to scan your machines for vulnerabilities and to ensure that all of the installed applications and operating systems are up-to-date and work properly.

Currently, only Windows and Linux (CentOS 7/Virtuozzo/Acronis Cyber Infrastucture) machines are supported for VA scanning. For more details about configurations for Linux machines, refer to "Vulnerability assessment for Linux machines".

How it works

  1. You create a protection plan with the enabled vulnerability assessment module, specify the VA settings, and assign the plan to machines.
  2. The system, by schedule or on demand, sends a command to run the VA scanning to the protection agents installed on machines.
  3. The agents get the command, start scanning machines for vulnerabilities, and generate the scanning activity.
  4. After the VA scanning is completed, the agents generate the results and send them to the monitoring service.
  5. The monitoring service processes the data from the agents and shows the results in the vulnerability assessment widgets and list of found vulnerabilities.
  6. When you get a list of found vulnerabilities, you can process it and decide which of the found vulnerabilities must be fixed.

You can monitor the results of the vulnerability assessment scanning in Dashboard > Overview > Vulnerabilities / Existing vulnerabilities widgets.