Now let's talk about categorizing assets. Let's answer these three questions here.
What is critical to the business?
How critical is a vulnerability,
and lastly, and most important,
will it be explored?
An automated vulnerability management system provides the ability to assign priorities of business risk.
Toe H Network Asset.
It's much easier to leave the correlation of on abilities, policies and procedures for remediation to computers
and its form or accurate than using a notebook.
The Vulnerability Management Asset tracking system incorporates
when you manage and use the system,
the results and the results and able an automated system that tracks on network assets by business risk and court lease them against known vulnerabilities.
So let's talk about scanning vulnerabilities now,
so we're gonna go ahead and
testing and analyzing devices for vulnerabilities.
How to profit, arise vulnerabilities
and streamline decision making for fixes.
Vulnerability management has many steps, but scanning is the foundational process for finding and fixing network vulnerabilities.
Choice of scanning technology is the most important element of an effective system. Four of one ability match
a vulnerability scan tests
the effectiveness of security policy and controls by examining that network infrastructure for vulnerabilities it's GAM provides to benefits.
One. The scan systematically test and analyzes his I P devices Service's and applications for known security holes
and to a post scan report reveals actual vulnerabilities and states what you need to fix an order
So let's talk about launching a scam
so the vulnerability scan is initiated by a application.
You could use a schedule scan to run automatically, or you could run one
The scan request needs to indicate the particular holds You want to check for vulnerabilities.
Also, you want to specify as many combinations of I P numbers ranges of I, P's and SS groups.
So here's what you need to gather before you launch
Need eyepiece or I P ranges
for your organization's domain and some networks.
If you want to scan specific devices, you need to identify them by I pee before launching the sky.
have ready I P's for your organization's business for your organization's business partners whose networks integrate business functions. Share it with applications on your network.
Some business regulations require scans for business partners to ensure the confidentiality integrity and availability of personally identifiable information,
whether for customers, employees a partners
Alert these partners. If your organization needs to. Skander, I appease. Integrate with your network.
Now let's talk about what do you need for scanning?
So one you need i p address
You need I P address to identify dance. It's on the inside of the scanner, basically the assets that's within your environment.
or basically the repositories within affordability. Imagine two holes, all the I P addresses,
and it actually groups it by assets
so the assets can be grouped by Windows,
which is that operating system.
It became the group by
and also can be grouped by E. S X
and the tools as needed.
Open vase Ness's qualities Rapid seven.
scab analyst can go on.
These tools are needed to perform
These are the actual tools that communicates with the server or that database
in which once you authenticate,
which means to get inside of that server,
it actually goes, and within that server it searches
It gathers the information as far as how many foreign abilities exists
and it gives it to you in a report,
it says, Look at the post assessment.
I don't need to use the two to test for vulnerabilities.
Is that true or folks?
The answer here is folks you do need a tool to test.
So let's look at the summer here.
In this video, we wrapped up our discussion about the benefit of security policies and vulnerability management and the importance of tracking inventory.
verifying vulnerabilities against inventory.