A system administrator runs a port scan using the company tool as part of vulnerability check. The administrator finds that the scan is identified as a threat and is dropped by the firewall. After further investigating the logs the administrator finds that the scan is dropped in the Threat Logs.
What should the administrator do to allow the tool to scan through the firewall?
chrisy042
Highly Voted 2 years, 1 month agomyname_1
2 years, 1 month agoCro13
Most Recent 4 months, 1 week agoMarshpillowz
11 months, 3 weeks agoPaloSteve
1 year, 6 months ago