Assessment Scenarios
With Flexera’s Software Vulnerability Research, you can scan target hosts using a variety of approaches:
Note:If the WSUS Self-Signed Certificate will be used to sign the update packages created by Software Vulnerability Research, you can use a different certificate as an alternative.
Important:Administrators must ensure that Software Vulnerability Research and its Vulnerable Software Discovery Tool have access to all necessary system and online resources which allow the application to run as intended. The following addresses should be white-listed in the Firewall/Proxy configuration to ensure that the client system is allowed access to these online resources:
|
•
|
http://crl3.digicert.com |
|
•
|
http://crl4.digicert.com |
|
•
|
http://*.ws.symantec.com |
|
•
|
https://app.flexerasoftware.com/ |
Note:If a machine has not checked in with Software Vulnerability Research in 90 days, the machine will be removed from your view. If the machine checks in again, it will reappear.