FAQ
The network discovery is performed on the hosts entered in the Include tab (Scan -> Settings -> Hostname /IP Address Range ). The network discovery op...
Wed, 7 Apr, 2021 at 6:43 AM
Follow the steps below in order to view previously requested reports: 1. Log in to the beSECURE system. 2. Go to Results › Reports. A list of previo...
Wed, 7 Apr, 2021 at 6:44 AM
If the "port range" is left empty, a default port range is used. This is a special port combination that has all the "known" ports, ex...
Wed, 7 Apr, 2021 at 7:27 AM
in the attached document - a step by step guide on how to generate a differential report in order to see persistent vulnerability
Wed, 7 Apr, 2021 at 6:46 AM
A custom logo can be added to the beSECURE reports for branding purposes. Note: This function is only allowed to Administrators and authorized Scanning...
Mon, 26 Apr, 2021 at 4:09 AM
No , beSECURE is an active network scanner . It does not monitor your network usage or traffic but it does scan your network for vulnerabilities by running...
Wed, 7 Apr, 2021 at 7:08 AM
If you want to create an additional scan that has similar parameters to an existing scan, you can clone it. Steps to Clone a Scan: Go to Scans List a...
Wed, 7 Apr, 2021 at 7:12 AM
Click on your user name which lays at the top right end of your screen . A menu will open click on Help A new page will open click on Show Version In...
Wed, 7 Apr, 2021 at 7:13 AM
In order to successfully use SSO, you must have an account created on the beSECURE with the matching name of your SSO login name. This account must match th...
Wed, 7 Apr, 2021 at 7:13 AM
Please use this form to submit your credit card information securely: https://secure.beyondsecurity.com/card.html
Wed, 7 Apr, 2021 at 7:15 AM