Your Privacy
We use cookies to give you a better experience in UTMStack
You can learn more about what kind of cookies we use, why, and how from our Privacy Policy. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings in our cookie banner to change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. For more details, check out our Privacy Policy link below.
Strictly Necessary Cookies
These cookies are necessary for the website to function and cannot be switched off in our systems, but do not store any person information. They are usually set in response to your actions that triggers a request for services, such as setting your privacy preferences, logging in or filling forms. You can change your browser settings to alert you about these cookies, but some parts of the Website may not work.
View Cookies
I'm testing the vulnerability scan features before I commit to the product and order a support contract. Has anyone successfully been able to run a vulnerability scan? I might have the ability with an acccess switch I'm testing but I have not been successful with any Windows device. Security credentials keep getting rejected.
0 Votes
Juan Manuel Libera Frómeta posted about 1 month ago Admin Best Answer
Dear Josh,
In UTMStack, the vulnerability scan feature is an important and useful function to ensure the security of your assets. In response to your question, it is possible to run a successful vulnerability scan using UTMStack.
Regarding the issue of security credentials being rejected when running the vulnerability scan on Windows devices, this could be due to several reasons, such as incorrect account permission settings, firewall issues, or connectivity problems. To resolve this, we recommend carefully reviewing the credentials settings and Windows device settings.
You can also find useful information in the Windows event logs in the LOGX section of UTMStack. For instance, event logs can provide information on the causes of authentication errors and connectivity issues.
If you require further assistance with this issue, please do not hesitate to contact us and our support team will be happy to assist you.
0 Votes
1 Comments
Juan Manuel Libera Frómeta posted about 1 month ago Admin Answer
Dear Josh,
In UTMStack, the vulnerability scan feature is an important and useful function to ensure the security of your assets. In response to your question, it is possible to run a successful vulnerability scan using UTMStack.
Regarding the issue of security credentials being rejected when running the vulnerability scan on Windows devices, this could be due to several reasons, such as incorrect account permission settings, firewall issues, or connectivity problems. To resolve this, we recommend carefully reviewing the credentials settings and Windows device settings.
You can also find useful information in the Windows event logs in the LOGX section of UTMStack. For instance, event logs can provide information on the causes of authentication errors and connectivity issues.
If you require further assistance with this issue, please do not hesitate to contact us and our support team will be happy to assist you.
0 Votes
Login or Sign up to post a comment