Review the list of all Domains updated since the last scan
Information
Different security requirements mandate different security controls. It is a security best practice to segment infrastructure into zones that impose similar security controls. Note - This check uses a variable supplied at .audit scan time via the User Interface. Please ensure the variable value is populated correctly.
Solution
Review the list of Domains. If any are missing or undocumented they should be investigated.