- play_arrow Vulnerability Assessment Scanner Overview
- play_arrow Troubleshooting Scanners
- play_arrow AXIS Scanner
- play_arrow Beyond Security Automatic Vulnerability Detection System Scanner Overview
- play_arrow eEye Scanner Overview
- play_arrow IBM AppScan Enterprise Scanner Overview
- IBM AppScan Enterprise Scanner Overview
- Creating a Customer User Type for IBM AppScan Enterprise
- Enabling Integration with IBM AppScan Enterprise
- Creating an Application Deployment Map in IBM AppScan Enterprise
- Publishing Completed Reports in IBM AppScan Enterprise
- Adding an IBM AppScan Enterprise Vulnerability Scanner
- play_arrow IBM Guardium Scanner Overview
- play_arrow IBM SiteProtector Scanner Overview
- play_arrow Juniper Profiler NSM Scanner Overview
- play_arrow McAfee Vulnerability Manager Scanner Overview
- play_arrow Microsoft SCCM Scanner Overview
- play_arrow nCircle IP360 Scanner Overview
- play_arrow Nessus Scanner Overview
- play_arrow netVigilance SecureScout Scanner Overview
- play_arrow NMap Scanner Overview
- play_arrow Outpost24 Vulnerability Scanner Overview
- play_arrow Qualys Scanner Overview
- play_arrow Rapid7 NeXpose Scanners Overview
- play_arrow SAINT Security Suite Overview
- play_arrow Tenable.io Scanner Overview
- play_arrow Tenable SecurityCenter Scanner Overview
- play_arrow Scheduling a Vulnerability Scan
- play_arrow Viewing the Status Of a Vulnerability Scan
- play_arrow Supported Vulnerability Scanners
Digital Defense Inc AVS Scanner Overview
The Digital Defense, Inc. AVS scanner module accesses vulnerability data from the Digital Defense, Inc. Frontline Vulnerability Manager (Frontline VM) by using the Frontline Connect API.
The Frontline Connect API works with JSA to collect vulnerability information.
JSA users can activate the Digital Defense vulnerability feeds in JSA to gather more information about security events by correlating vulnerability and threat data. Greater visibility is provided about the risk posture of hosts so that the user can make better, more informed decisions, and then take appropriate security action.
Before JSA can collect Digital Defense Frontline VM vulnerability data, you must complete the following steps: