Host Vulnerability Scanning
Conducts comprehensive assessments of operating systems, network services, and configurations, aligned with the
. latest CVE standards. Coverage includes:
. Unpatched OS vulnerabilities
. Common application flaws
. Network service weaknesses
. Trojan and backdoor detection
. Password cracking tests
. Insecure or misconfigured settings
. Network port scans