Vulnerability Scanning Defenses
¨Scan your own network using latest vulnerability database
–Do not use dangerous plug-ins against production servers
¨Close all unused ports
¨Apply patches to your systems
¨Have policy and practices for building and maintaining secure systems