Configuration Audits

In this chapter, we will cover the following:

  • Introducing compliance scans
  • Selecting a compliance scan policy
  • Introducing configuration audits
  • Performing an operating system audit
  • Performing a database audit
  • Performing a web application scan

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.