Please see more about the scanning methodology here:
Articles in this section
- Are there impact to devices when scanning?
- How long does it take to scan and IP? In general?
- How can I change reporting language
- Can I customize reporting in the Penetrator?
- Do the Penetrator check for SSL vulnerabilities?
- Penetrator Performance Impact
- Question about Penetrator Distribution License
- Penetrator cant sent mails
- User has no scans left
- - New User Interface Penetrator