Tenable Vulnerability Management Tips and Tricks, Performance Tuning, Agent, Troubleshooting – 51 Security


An exclusions list designates specific assets that you do not want your vulnerability management solution to scan.

Exclusion lists can be particularly useful to help maintain good scan hygiene and performance. If you run non-credentialed scans, for example, you may not collect enough data to uniquely identify a firewall or Layer 3 switch when multiple interfaces are scanned. An exclusion list can remove duplicate IP addresses in situations like this assessment.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *