How does F-Secure Elements Vulnerability Management work? - F-Secure Community
<main> <article class="userContent"> <p> </p>How does F-Secure Elements Vulnerability Management work? <p> As a vulnerability scanning and management solution, F-Secure Elements Vulnerability Management follows a five-step workflow to secure the system assets in your business network. The workflow runs as follows: </p> <div> <ol><li><strong>Discovery </strong> <p>Elements Vulnerability Management detects and maps all systems within your network range. </p> </li> <li><strong>Scanning</strong> <p>The Elements Vulnerability Management scanning engines scan all identified systems for vulnerabilities. </p> </li> <li><strong>Management </strong> <p>The results of the scans can be viewed and managed, such as prioritizing and assigning tasks for remediation. </p> </li> <li><strong>Reporting</strong> <p>Customizable reports can be generated. </p> </li> <li><strong>Verification</strong> <p>This stage involves re-scanning systems, manually or routinely, to ensure proper implementation of fixes. </p> </li> </ol></div> <p>The Elements Vulnerability Management portal, the centralized dashboard, oversees the entire process and is the central location for you to control, assign, follow, and manage all security issues within the workflow and in-built ticketing system. </p> <div id="related"> <strong>Related information</strong> <ul><li><a rel="nofollow" href="https://community.f-secure.com/vulnerability-management-en/kb/articles/5734">What is F-Secure Elements Vulnerability Management? </a></li></ul></div> <br> </article> </main>