in the attached document - a step by step guide on how to generate a differential report in order to see persistent vulnerability
Articles in this section
- Lost my LSS password what can I do ?
- Why should I white list the IPs requested by Beyond Security
- How do I ignore a vulnerability?
- How to create an organization ?
- How to set default permissions for new objects
- How to change alarm status
- How do I open up historial scan reports?
- How to generate a report
- What IPs I should whitelist
- How do I update multiple scans at once