Red Hat NETWORK 3.6 - Guide de l'utilisateur Page 57

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 56
Copyright © 2002-2012 Tenable Network Security, Inc.
57
In the above example, a filter is applied to only display events that have been correlated.
THE PASSIVE VULNERABILITY SCANNER IS REAL-TIME
Since the PVS’s vulnerability data is being fed into SecurityCenter 24x7 and PVS’s plugins
are updated by Tenable, the accuracy of the passive vulnerability data in SecurityCenter
greatly enhances the quality of the security information available to the SecurityCenter’s
users.
Vue de la page 56
1 2 ... 52 53 54 55 56 57 58 59 60 61

Commentaires sur ces manuels

Pas de commentaire