Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Scan Configuration

 

In JSA Vulnerability Manager, all network scanning is controlled by the scan profiles that you create. You can create multiple scan profiles and configure each profile differently depending on the specific requirements of your network.

Scan Profiles

Use scan profiles to do the following tasks:

  • Specify the network nodes, domains, or virtual domains that you want to scan.

  • Specify the network assets that you want to exclude from scans.

  • Create operational windows, which define the times at which scans can run.

  • Manually run scan profiles or schedule a scan to run at a future date.

  • Run, pause, resume, cancel or delete a single or multiple scans.

  • Use centralized credentials to run Windows, UNIX, or Linux operating systems.

  • Scan the assets from a saved asset search.