Event Analysis Training - Run NT and Pay the Price
by Ron Gula on October 16, 2008
Most large enterprise networks have a few legacy systems around – either because they were “forgotten” or because they support an old application that was never ported to a newer release. Such legacy systems can be the Achilles heel of network security.
The following sanitized screen shot comes from one of Tenable’s research sites: