The following information is for Scan Diagnostic purposes only, and is not indicative of a detected vulnerability.
SSH credentials were configured but did not have root level access. Root level access to Unix targets is required in order to collect data used in both vulnerability and policy assessments. This includes installed software, and policy configuration data.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center