AnsweredAssumed Answered

fallback behavior for failed authentication in Vulnerability Management?

Question asked by Eddie Allan on Mar 31, 2015
Latest reply on Feb 19, 2016 by Umesh Hande

What is the fallback behavior of the vulnerability scanner if it fails to authenticate to a host for which it has an authentication record defined?  Does it skip that host or does it continue with what essentially is an unauthenticated scan?

 

I've got two similar option profiles; one that uses authentication and one that does not.  Generally we rely on the data returned by authenticated scans so I'm wondering if there's value in doing both the authenticated and unauthenticated scans, or if the results of the unauthenticated scan would mostly be redundant.

Outcomes