Please see more about the scanning methodology here:
Articles in this section
- Are there impact to devices when scanning?
- How long does it take to scan and IP? In general?
- How can I change reporting language
- Can I customize reporting in the Penetrator?
- Do the Penetrator check for SSL vulnerabilities?
- Small factor and 1U , carry all same features except number of ip ... correct ?
- Does your penetrator appliance also include wifi penetration (the feature in portable penetrator) ?
- Report improvements
- Penetrator V40 Release Notes
- Scanning Profiles