door-openCredentialed Scan

This scan allows users to log into the system and see its vulnerabilities from a trusted source’s perspective. This process identifies vulnerabilities from workstations, network hosts, and servers while giving users a better understanding of the system’s patch management and configurations.

circle-info

A credentialed scan will find more vulnerabilities than a non-credentialed scan and it is necessary for gray-box testing.

Last updated