Solution Overview
How to Evolve Your Legacy VM Practice to a Risk-based VM Program - Step Two: Assess
![](/sites/drupal.dmz.tenablesecurity.com/files/images/collateral/thumb-rbvm-solution-step2-thumb.png)
Are your scanning policies ready for primetime? Read this solution guide to find out.
Risk-based vulnerability management enables your team to gain a dynamic, continuous view of your evolving attack surface and focus on the vulnerabilities that pose the greatest risk. In the second of our five-part risk-based VM Solution Guide, we provide step-by-step instructions on the "Assess" stage of the risk-based VM lifecycle to ensure that your team scans frequently and thoroughly enough to capture the latest vulnerabilities and misconfigurations across your attack surface.
- Risk-based Vulnerability Management