ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

How to run vulnerability scan  to find out any vulnerability in a product?


Article ID: 223076


Updated On:


CA Automic Applications Manager (AM)


How to run vulnerability scan  to find out any vulnerability in a product?



Applications Manager 9.x


The main way to identify vulnerabilities is through vulnerability scanning, and a scanner’s efficacy depends on two things:

  • the ability of the scanner to locate and identify devices, software and open ports, and gather other system information
  • the ability to correlate this information with known vulnerability information from one or more vulnerability databases

Vulnerability scanning can be configured to be more or less aggressive or intrusive, and this is important because there is the possibility that the scanning process can affect the performance or stability of systems being interrogated. It can also cause bandwidth issues on some networks.

A solution to this may be to schedule vulnerability scanning outside of business hours, but this leads to the possibility that employees who connect laptops to the network may not have them connected when the scanning takes place.

One way to get around this second problem is through the use of endpoint agents running on laptops and other devices, which enable a vulnerability management system to have inventory data pushed to it by the agent when it is connected to the network rather than pulled in during a scheduled scan of the organization’s network.

Another approach is to use a technique called adaptive vulnerability scanning, which detects changes to the network, such as the connection of a new laptop or other device for the first time. When this happens, the vulnerability scanner launches automatically and scans the new system immediately or as soon as possible, rather than waiting for the next scheduled scan.