FAQs
I've fixed a risk, why has it not been resolved?
0 min
hexiosec asm implements various bespoke methods in the enumeration of attack surfaces and identification of risks in addition, hexiosec asm uses some external sources for scan data because some data is sourced externally, results may not yet reflect the change you have applied in certain cases, hexiosec asm will remove results once they haven't been observed for a specified period if this is the case it will be indicated in hexiosec asm for example, hexiosec asm may rely on an external service todetermine whether an insecure protocol, such as ftp, is running on a discovered ip address and port hexiosec asm represents ip address (or domain) and port pairs as a service (e g , 203 0 113 12 21) on the service's explore page you can see when it was last observed if the protocol has since been disabled in your infrastructure, the page will also indicate when it is expected to be removed from your hexiosec asm scan results