Are you sure you're scanning all of your assets? Join the Technical Series with a Qualys Security Solution Architect to learn how vulnerability scans work and how to get the most out of them for your environment.
This session will cover:
- The anatomy of a Vulnerability Scan - The scan process (host discovery, port discovery, service discovery, vulnerability scan) and option profiles.
- How to set up, use and troubleshoot Authentication Records.
- Scanning strategies - Light Inventory vs Map, full-range vs targeted scanning, scanning cloud agent assets.
- Scanning best practices - Firewalls, the natural enemy of vulnerability scanning, VLAN trunking, seamless scaling for scanner appliances.