For all servers and network accessible devices capable of running a host agent, host-based scanning tools are used, and scan results are uploaded to a central location for reporting. Microsoft 365 uses a third-party scanning tool utilizing two different techniques to ensure full coverage of its assets: host-based and network-based. Microsoft 365 routinely scans all its systems and applicable network devices for known vulnerabilities and centrally tracks their remediation in a timeframe directly related to their severity. For this reason, systems and baselines should be continuously evaluated and updated through standardized processes enforced across the enterprise. Systems deemed secure at the time of deployment are soon considered insecure due to newly identified vulnerabilities in the ever-evolving threat landscape. An organization’s security posture isn't achieved through a one-time effort, it requires consistent evaluation and maintenance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |