Q.How does DVM operate and how does the scan flow?


1.Set a fixed range >>> scan >>> analyze network & service >>> show result >>> Produce report

2.Scan range- Key in target IP addresses, by individuals, range or text file.

3. Start scanning.

4.Analyze network & service.

5.Show result- The scan result displays all information including O.S. type, amount of vulnerability, patch suggestion…etc. as well as the auto patch for Registry.

6.Produce report- Graphic charts + Risk level to easily explain security status.