Enable host identification
Host identification is required for normal operation, but you can disable it if you want to temporarily disable a scanner. When you disable host identification, vulnerability scanning stops working, and dashboard reporting errors will occur after 24 hours.
Disable host identification
Host identification is required for normal operation, but you can disable it if you want to temporarily disable a scanner. When you disable host identification, vulnerability scanning stops working, and dashboard reporting errors will occur after 24 hours.