Limitations and Considerations
-
Vulnerability detection is limited to software present in the NVD database.
-
Requires accurate CMDB data for effective correlation.
-
Schedule configuration requires management server access.
-
Network connectivity is required for NVD synchronization.