AnsweredAssumed Answered

vulnerability scanning best practices

Question asked by Carla Bradley on Aug 21, 2017
Latest reply on Aug 29, 2017 by Erica Chalfin

Our IT Security department needs the ability to scan our RSA servers for vulnerabilities via an authenticated scan. Do you have a best practice to do that? We would prefer they not have the rsaadmin account and have an account with read only access to the box. 


We have 4 VM RSA servers and 4 physical RSA servers which are all on AM 8.2 SP1 Patch 3.