lanscan2011manual

Page 45

Table 11 – Response time icons

Category

3.6.1

Information

Response time in milliseconds

Fast response

Less than 25ms

Medium response

Between 25ms and 100ms

Slow response

More than 100ms

Vulnerability assessment

Screenshot 20 – The Vulnerability Assessment node

Click on any Vulnerability Assessment node to view the security vulnerabilities identified on the target computer grouped by type and severity as follows: 

High Security Vulnerabilities

Low Security Vulnerabilities

Potential vulnerabilities

Missing Service Packs

Missing Patches

High/Med/Low Security vulnerabilities Click on the High Security Vulnerabilities or Low Security Vulnerabilities sub–nodes for a list of weaknesses discovered while auditing a target device. Table 12 below describes these groups:

Agent–less Auditing

Administration and configuration manual  31


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.