# What are the typical features offered by vulnerability scanner?

What are the typical features offered by vulnerability scanner?

##### Post Metadata
- Posted at: almost 4 years ago
- Author title: Pinned by G2 as a common question



## Comments
### Comment 1

Vulnerability scanners are essential tools for identifying and mitigating security risks in computer systems and networks. They offer a range of features to help organizations uncover vulnerabilities and weaknesses in their systems. Following is brief:
 Vulnerability scanners can scan an organization&#39;s network infrastructure to identify open ports, services, and hosts. This initial step helps in understanding the network&#39;s attack surface. They identify known vulnerabilities in software, operating systems, and network devices. These vulnerabilities are usually cataloged in databases that are regularly updated to include the latest security issues.

Some scanners are equipped to verify whether systems and configurations adhere to specific security standards, regulations, or best practices. This is crucial for ensuring compliance with industry-specific requirements. Users can define their scanning policies and parameters, allowing for customized scans to address their specific needs. This can help organizations focus on particular aspects of their environment.

 Many scanners provide asset discovery and tracking capabilities, which are essential for understanding the devices connected to your network and managing their vulnerabilities over time.
Vulnerability scanners tend to generate detailed reports outlining identified vulnerabilities, their severity, and potential impact.  Scanners often assign risk scores to vulnerabilities based on factors like their severity, potential impact, and exploitability. 
 Many vulnerability scanners offer integration with other security tools and solutions, such as patch management systems or Security Information and Event Management (SIEM) platforms, to streamline the vulnerability management process.  They can be scheduled to conduct regular scans to ensure that new vulnerabilities are quickly detected as software updates or configurations change.

Very important: A well-designed user interface makes it easier for security professionals to interact with and interpret the results of scans.

 Some scanners support agent-based scanning, which involves deploying lightweight agents on target systems to gather more detailed information about vulnerabilities. Moreover, paid vulnerability scanner solutions typically include access to support services and regular updates to vulnerability databases.


##### Comment Metadata
- Posted at: over 2 years ago
- Author title: Application Security Researcher




## Related Product
[Qualys WAS](https://www.g2.com/products/qualys-was/reviews)

## Related Category
[Vulnerability Scanner](https://www.g2.com/categories/vulnerability-scanner)

## Related discussions
- [How well does Trello scale into a larger team?](https://www.g2.com/discussions/1-how-well-does-trello-scale-into-a-larger-team)
  - Posted at: almost 13 years ago
  - Comments: 6
- [Can we please add a new section](https://www.g2.com/discussions/2-can-we-please-add-a-new-section)
  - Posted at: almost 13 years ago
  - Comments: 0
- [Quantifiable benefits from implementing your CRM](https://www.g2.com/discussions/quantifiable-benefits-from-implementing-your-crm)
  - Posted at: almost 13 years ago
  - Comments: 4


