You can identify the discovery methods used for detecting the various vulnerabilities in the KnowledgeBase. Each vulnerability in the KnowledgeBase is assigned one of these discovery methods: Remote Only, Authenticated Only, or Remote or Authenticated.
This method is assigned when you see the vulnerability has the remote
discovery icon without
the authenticated discovery icon
. This
means the vulnerability can be detected by remote, unauthenticated scanning.
This method is assigned when you see the vulnerability has the authenticated
discovery icon without the remote discovery icon
. This means the vulnerability
can only be detected using authenticated scanning.
This method is assigned when you see the vulnerability has the authenticated
discovery icon and the remote discovery icon
.
This means the vulnerability can be detected by remote discovery OR authenticated
discovery. Only one of these methods is required for vulnerability detection.