Difference between revisions of "Device Stability with Security Tools"

From IVS Wiki
Jump to: navigation, search
 
Line 1: Line 1:
 
{{Article | title = {{PAGENAME}} | content =  
 
{{Article | title = {{PAGENAME}} | content =  
 
<onlyinclude>
 
<onlyinclude>
Some devices in our implementation may be flagged by vulnerability or security scanners due to open ports or other configurations. In some cases, excessive scanning can disrupt the normal function of the devices. To ensure continuous operation, we recommend whitelisting these devices in your security scanning tools to prevent unnecessary interference.
+
Some devices in our implementation may be flagged by <u>vulnerability</u> or <u>security scanners</u> due to open ports or other configurations. In some cases, <em>excessive scanning</em> can disrupt the normal function of the devices. To ensure continuous operation, we recommend <b>whitelisting</b> these devices in your security scanning tools to prevent unnecessary interference.
 +
 
 +
<b></b>
 +
 
 +
<b>Impacted devices</b> include, but are not limited to:
 +
*Encoders
 +
*Decoders
 +
*DSPs
 
</onlyinclude>
 
</onlyinclude>
 
{{hr}}
 
{{hr}}

Latest revision as of 14:22, 1 October 2024

Device Stability with Security Tools

Some devices in our implementation may be flagged by vulnerability or security scanners due to open ports or other configurations. In some cases, excessive scanning can disrupt the normal function of the devices. To ensure continuous operation, we recommend whitelisting these devices in your security scanning tools to prevent unnecessary interference.

Impacted devices include, but are not limited to:

  • Encoders
  • Decoders
  • DSPs

🕮Looking for our Network Requirements? Click Here!