Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Assets

Go to the 'Company View'.

Click on 'Assets' to access the assets view.

...

In this section, you will find a comprehensive list of scanned assets.


The list includes assets along with their associated risk scores and vulnerability counts.

...

In this section, you can find the following information about the asset:

  • System information

  • Storage

  • Network information

  • BIOS Information

  • Firewall Policy

  • Problems

  • Solutions

  • Firewall Rules

  • Internal Ports

  • External Ports

  • Software

  • Asset Patches

  • Extension Programs

  • Services

  • User Shares

...

We can directly copy the script and run it on the machine for remediation.

...

Problems

Click on 'Assets' to access the Problems view.

...

The Solutions lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.

...

Application Vulnerabilities

...

Scan Settings lets you choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, and SSN, and Street.

Select Default Extension

...

Once all required fields are selected, please click on Save to successfully save this PII Profile with a message as Saved Successfully.

Initiate PII Scan

Locate and select the profile for which you want to initiate the PII scan.

...