A Step-by-Step Video Guide to Using Fortra VM- Series #1

By Mieng Lim

From logging in to scanner management, this short video series helps you easily configure Fortra VM so you can get started quickly. Watch as our experts guide you through account set up where you can create and assign user groups, business groups, and asset groups. 

1. Fortra VM Login

After your account is created, get started quickly by learning about Fortra VM’s centralized dashboard and the key indicators that rate your security posture.

2. Account Configuration

Go through your account profile details as well as service subscriptions and other general account settings like language and time zone. You will see your account status, report branding, insight classifications, and the client advocate dedicated to your account that will help with any questions.

3. Users and Roles 

Simple step-by-step guidance to create users, assign, customize, and differentiate user roles.

4. Business Groups

Learn how to create, define, and assign permissions to groups to make sure the right people have access to (or exclusion from) to sensitive information.

5. Asset Groups 

Manually create asset groups based on devices within your security network and learn how to create filters after Fortra VM automatically creates dynamic asset groups based on a VM scan.

6. Labels 

Create manual active labels based on vulnerabilities or assets and learn how to make automatic smart labels that are assigned based on preset criteria.

7. Scanner Management

Learn how to install and configure scanner management options with Remote Network Appliance (RNA) to perform internal and external scans on infrastructure internet accessible assets and web applications.

Amplify Your Security Strategy 

Combine Fortra VM with Our Penetration Testing 

Learn More

About Digital Defense

Our SaaS platform supports Fortra Vulnerability Management, Web Application Scanning, and Active Threat Sweep that together provide:

  • Asset discovery and tracking
  • OS and web application risk assessment
  • Targeted malware threat assessment
  • Machine learning features that leverage threat intelligence
  • Agentless & agent-based scanning
  • Penetration testing for networks, mobile applications, and web applications
  • Compliance management. One of the world’s longest tenured PCI-Approved Scanning Vendors

Our SaaS platform virtually eliminates false-positives associated with legacy vulnerability management solutions, while also automating the tracking of dynamic and transient assets and prioritizing results based on business criticality.

Share This