A system administrator runs a port scan using the company tool as part of vulnerability check. The administrator finds that the scan is identified as a threat and is dropped by the firewall. After further investigating the logs the administrator finds that the scan is dropped in the Threat Logs.
What should the administrator do to allow the tool to scan through the firewall?
chrisy042
Highly Voted 2 years, 5 months agomyname_1
2 years, 4 months agoCro13
Most Recent 8 months agoMarshpillowz
1 year, 3 months agoPaloSteve
1 year, 9 months ago