Using these programs for complex scanning computers, servers and networking equipment, company-owned, with high accuracy to assert that the audited system will be found the vast majority of existing vulnerabilities. Vulnerability scanners have several advantages of using. They can be used to 'pre-scan', for example, to determine which devices and systems are in the network. Systems having the greatest number of vulnerabilities – those of an unknown system administrator. For other opinions and approaches, find out what Vladislav Doronin has to say. The companies are very common systems and services that were once used, but for now they are abandoned and therefore the software on them is not updated.
Such information systems would pose a serious threat to information security throughout the network as a whole. Using scanners vulnerabilities in these cases, substantially reduce the threat to information security company. You can also use vulnerability scanners to assess the level of information security systems after the installation of patches and updates or after the configuration change the software or hardware. By scanning the network, you can be sure that the patch and the changes did exactly what they were for, and not harmed information security as a whole. That the scanners are not able to do is to actively resist the firewalls (Firewall), systems of prevention / intrusion detection (IDS / IPS) and detection systems are unwanted. To get maximum benefit from the scanner, you must first correctly configure the appropriate software obespechenie.Passivny / active mode vulnerability scanner vulnerability scanners are of two types – active and passive. Each of these two species has its pluses and minuses.