-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
What is the difference between active & inactive hosts?
Holm Security's scanning engine determines active & inactive hosts during the first step of the network scan.There are different methods the scan engine use; one is simply pinging the host and seeing if it responds either on TCP or ICMP. Another example is TCP SYN/ACK, which can also be disabled in case of firewall interference.