How does the vulnerability scan work?

Created by Charley Downey, Modified on Fri, 22 Mar at 12:56 PM by Charley Downey

Our vulnerability monitor checks publicly exposed Internet assets to see if the asset is running out of date software that’s known to be vulnerable.  We conduct a port scan then check any exposed services for their software version to see if the asset is known to be vulnerable.


If we find vulnerabilities, our scanner will return results using data from the National Vulnerability Database, a government-backed industry-standard data set for vulnerability information.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article