The ability to configure and perform vulnerability scans against a single network or multiple network segments (or locations) can be accomplished by downloading and installing the Shield network vulnerability scanner within the target network location. These scans will attempt to identify vulnerabilities against the targeted IP addresses, CIDR ranges, and/or domains.
Deploy a Dedicated Shield Scanner
Execute the Shield Scanner Installation Script
Confirm the Scanner has been Successfully Linked
Type | Specs |
---|---|
CPU | 4 2GHz cores |
Memory | 8 GB RAM |
Disk Space | 50 GB (not including space used by the host OS) |
sudo service ShieldCyber.Agent.Shield status
And the output of this command should state that the service is idle:
yourpasswordhere
value and savedocker compose up -d