-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is the difference between active & inactive hosts?
Holm Security's scanning engine determines active & inactive hosts during the first step of the network scan.There are different methods the scan engine use; one is simply pinging the host and seeing if it responds either on TCP or ICMP. Another example is TCP SYN/ACK, which can also be disabled in case of firewall interference.