Vulnerability assessment
The vulnerability assessment process consists of the following steps:
- You create a protection plan with the enabled vulnerability assessment module, specify the Vulnerability assessment settings, and assign the plan to machines.
- The system, by schedule or on demand, sends a command to run the vulnerability assessment scanning to the protection agents installed on machines.
- The agents get the command, start scanning machines for vulnerabilities, and generate the scanning activity.
- After the vulnerability assessment scanning is completed, the agents generate the results and send them to the monitoring service.
- The monitoring service processes the data from the agents and shows the results in the vulnerability assessment widgets and list of found vulnerabilities.
- When you get a list of found vulnerabilities, you can process it and decide which of the found vulnerabilities must be fixed.
You can monitor the results of the vulnerability assessment scanning in Dashboard > Overview > Vulnerabilities / Existing vulnerabilities widgets.