To enhance our website and services, we use Google Analytics, which requires your consent below to gather data about your device and site usage. Your data may be transferred outside the EU by Google, where regulations may differ. Consent is voluntary and revocable by contacting us.
Essential cookies are strictly necessary for site operation. For details on cookie usage as well as how we process your data, please read our policy.
This includes tools that look at the hosts Operating System and applications for vulnerabilities that could be exploited and checks them against the System Security Policy for non-compliance. These products work in contrast from the Network Mapping Tools by analysing the host from a privileged user account. Many Network Vulnerability Scanners have the ability to include privileged account to also perform such scans. A Policy Compliance Monitor advises about what vulnerabilities exist. A Policy Compliance Manager not only advises about the vulnerabilities that exist but will also fix them. Most require agents to be installed on the target host, though there are some that don't.