A security analyst at an organization is reviewing vulnerability reports from a newly deployed vulnerability management platform. The organization is not receiving information about devices that rarely connect to the network. Which of the following will the analyst most likely do to obtain vulnerability information about these devices?
kmordalv
1 year, 7 months agokumax
1 year, 8 months agoskibby16
1 year, 9 months agoDree_Dogg
1 year, 9 months agoJakeH
1 year, 9 months agosimpfemboy
1 year, 9 months agoChilaqui1es
1 year, 8 months ago