Performing a discovery scan ensures that all in-scope devices are identified and included in the vulnerability assessment.
A discovery scan identifies all active devices on the network before running a detailed vulnerability scan. It ensures that all in-scope devices are included in the assessment. Process: The discovery scan uses techniques like ping sweeps, ARP scans, and port scans to identify active hosts and services. #enumerration reconnaissance active