Example: Host Discovery

Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a host discovery scan to see what hosts are on your network. After you have a list of hosts, you can choose what hosts you want to target in a specific vulnerability scan.

Hosts discovered by a host discovery scan do not count towards your license limit, if applicable. For more information, see License Utilization.

The following overview describes a typical workflow of creating and launching a host discovery scan, then creating a follow-up scan that target discovered hosts that you choose.