Back to Trust Center
R
Reviewing Vulnerability Scanner Usage

Mechanisms exist to monitor logs associated with scanning activities and associated administrator accounts to ensure that those activities are limited to the timeframes of legitimate scans.