Security Knowledge Base

Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

  A postman collection has been developed in Kenna Security’s All_Samples repository. This collection will assist you with using Kenna Security’s APIs in the Postman app. Postman is a powerful tool that lets you explore APIs. The new Kenna Security ...

AdvocateRick_0-1684428352807.jpeg AdvocateRick_1-1684428352816.png AdvocateRick_2-1684428352823.png AdvocateRick_3-1684428352827.png

The Cisco Document Team has posted an article. This document describes how to calculate the 95th percentile of the Flow Rate Usage in Stealthwatch or Secure Network Analytics for FlowRate Know of something that needs documentin...

When managing Cisco Vulnerability Management systems, there are situations where you want to remove an asset, which could be a server, router, or laptop. One reason to manually remove an asset can be to show risk score changes without waiting for th...

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Quick Links
Recognize Your Peers
Top Contributors