308 Vulnerability ManageMent
Agents have a great advantage over other technologies in that
they can perform the vulnerability and compliance assessments of
the host before they are connected to the network. is is done
using the last known policy. If the policy is not changed upon con-
nection, then access can be granted with no further effort. e
methods may vary from the previous example; however, the process
is the same conceptually.
10.3.2 Patch Management
A perfect opportunity for integration of VM technology is patch
management. e two are ideally suited because a large percentage
of the vulnerabilities in packaged software is corrected with patches.
is could even be applied to custom, in-house software.
When one considers the complex