34 Vulnerability ManageMent
vulnerability is seven calendar days. According to the reports
in the system, this is taking two to three weeks.
March 5: e Microsoft-based systems are configured with cre-
dentials using Active Directory
®
to perform in-depth scans.
In effect, these credentials allow the scanner to log in to the
system to check critical patches and configuration items.
Management reports have been consolidated from the two
systems into a single report that is run on demand through a
Web interface. e system engineer begins work on detailed
remediation reports. However, many of the data elements
from the two systems do not directly match. One uses CVE
(Common Vulnerabilities and Errors) codes to identify vul-
nerabilities and the other ...