McAfee MTP08EMB3RUA Product Guide - Page 145

Using Vulnerability Scanning, Vulnerability scanning features

Page 145 highlights

9 Using Vulnerability Scanning Vulnerability scanning measures the security of websites, domains, and IP addresses by testing them for thousands of risks and issues in many vulnerability classes and categories. It then reports any vulnerabilities detected, prioritizes the risks they present, and recommends remediation tasks and patches. Contents Vulnerability scanning features The vulnerability scanning widget and portal Overview of scanning process Types of devices to scan Types of scans Managing scan devices Performing scans How detections are reported Viewing scan results Frequently asked questions Error messages Vulnerability scanning features Vulnerability scanning provides automated network security audits combined with an interactive vulnerability management portal Vulnerability scanning is completely web-based and requires no installation of software or hardware. Key features of vulnerability scanning are: • Protects your entire network infrastructure non-invasively. • Identifies unauthorized server applications and tracks system configuration changes. • Looks for thousands of different vulnerabilities residing in Internet services, shopping carts, ports, operating systems, servers, key applications, firewalls, addressable switches, load balancers, and routers. • Provides detailed reporting and specific recommendations for resolving vulnerabilities detected by more than 10,000 individual vulnerability tests plus port scans. • Collects and updates vulnerability data around-the-clock from hundreds of sources worldwide, ensuring its ability to detect the latest risks. • Meets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMM-LEACH-BILEY, SARBANES-OXLEY, and other federal legislation. McAfee Total Protection Service 5.1.5 Product Guide 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

9
Using Vulnerability Scanning
Vulnerability scanning measures the security of websites, domains, and IP addresses by testing them
for thousands of risks and issues in many vulnerability classes and categories. It then reports any
vulnerabilities detected, prioritizes the risks they present, and recommends remediation tasks and
patches.
Contents
Vulnerability scanning features
The vulnerability scanning widget and portal
Overview of scanning process
Types of devices to scan
Types of scans
Managing scan devices
Performing scans
How detections are reported
Viewing scan results
Frequently asked questions
Error messages
Vulnerability scanning features
Vulnerability scanning provides automated network security audits combined with an interactive
vulnerability management portal
Vulnerability scanning is completely web-based and requires no installation of software or hardware.
Key features of vulnerability scanning are:
Protects your entire network infrastructure non-invasively.
Identifies unauthorized server applications and tracks system configuration changes.
Looks for thousands of different vulnerabilities residing in Internet services, shopping carts, ports,
operating systems, servers, key applications, firewalls, addressable switches, load balancers, and
routers.
Provides detailed reporting and specific recommendations for resolving vulnerabilities detected by
more than 10,000 individual vulnerability tests plus port scans.
Collects and updates vulnerability data around-the-clock from hundreds of sources worldwide,
ensuring its ability to detect the latest risks.
Meets the website security vulnerabilities audit requirements mandated by HIPAA,
GRAMM-LEACH-BILEY, SARBANES-OXLEY, and other federal legislation.
9
McAfee Total Protection Service 5.1.5 Product Guide
145