- Knowledge base
- Network & System Security
- Policy scanning
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is policy scanning?
Policy scanning is verification against a list of best practices, called benchmarks, of OS configurations.We use CIS benchmarks from the Center for Internet Security (CIS), a set of globally recognized and consensus-driven best practices to help security practitioners implement and manage their cyber security defenses.
Every individual policy scan is specific to the target Operating system.
We support many of the most popular operating systems; each has its own list of checks based on which OS the users select in the scan profile.
If you want to learn more about how to get started with policy scanning, please refer to this article:
https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-policy-scanning