Product manual
Table 39: Software information from an audit 92
Table 40: View by computers information 95
Table 41: Response time icons 105
Table 42: Vulnerability level weight scores 106
Table 43: Vulnerability groups 108
Table 44: Hardware information from an audit 111
Table 45: Software information from an audit 112
Table 46: System information from an audit 112
Table 47: Automatic remediation stages 117
Table 48: Patch Auto-Deployment Advanced Options 119
Table 49: Manage applicable schedule scans 124
Table 50: Before deployment 127
Table 51: After deployment 128
Table 52: Advanced deployment options 129
Table 53: Advanced deployment options 132
Table 54: Warning messages 136
Table 55: Remediation actions 139
Table 56: Deploy software updates options 141
Table 57: Uninstall software updates options 143
Table 58: Options available in Deploy Custom Software 144
Table 59: Deployment options 145
Table 60: Uninstall applications 146
Table 61: Deployment options 148
Table 62: Filter security scan dialog 152
Table 63: Updates download status 153
Table 64: Security updates download 154
Table 65: Troubleshooting failed Software Updates 154
Table 66: Available General Reports 160
Table 67: Available Legal Compliance Reports 162
Table 68: Scheduled report template options 167
Table 69: Target Domains & Computers options 167
Table 70: Scheduling options 168
Table 71: Alerting & Saving Settings 169
Table 72: Report placeholders 173
Table 73: Mail settings parameters 178
Table 74: Notifications options 178
Table 75: Database retention options 184
Table 76: Proxy settings 185
Table 77: Vulnerability properties dialog 192
Table 78: TCP Port scanning options 203










