Vulnerability Scannning
Overview
ThreatDefence Vulnerability Scanning continuously assesses external systems for known vulnerabilities, misconfigurations, and outdated software. Results are ingested into the platform and correlated with SOC workflows for monitoring, prioritization, and remediation tracking.
How It Works
External assets (IP ranges) are scanned periodically (by default, weekly).
Scans can also be run on-demand as required.
The scanning engine checks against vulnerability databases (e.g., CVE, CPE mappings) to identify issues.
Detects exposed services, weak configurations, and outdated versions.
Findings are normalized and ingested into the ThreatDefence platform.
Results are available in dashboards and reports, and can be escalated through SOC workflows.
Vulnerabilities are mapped to CVSS scoring and assigned a priority level.
If a vulnerable system generates security alerts, correlation rules automatically highlight it for immediate action.
How to Activate Vulnerability Scanning
To enable vulnerability scanning for your organization, contact your ThreatDefence representative. Provide your public IP ranges and advise on your preferred scan schedule (e.g., weekly, monthly).
Vulnerability Reports
All vulnerability findings are available in the Analyst Console, while summary reports can be exported from our Customer Portal. Reports include:
Detected vulnerabilities (with CVSS scores and severity).
Affected IPs and services.
Historical trend of vulnerabilities over time.
Export options (PDF) for offline analysis and reporting.
Last updated