3VULNERABILITY SCANNERS
Although vulnerability management has several other components, the raw data you collect from your vulnerability scanner is the most important. If the scanner isn’t configured correctly or if it’s located in the wrong place, it won’t give you the data you need for the rest of your vulnerability management process.
This book assumes use of a network-based scanner, which learns about a system by sending packets across the network and listening for particular responses. In this chapter, I’ll discuss how network-based vulnerability scanners work and how to make the most of them in your environment.
What Vulnerability Scanners ...
Get Practical Vulnerability Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.