A system and method for a vulnerability assessment mechanism that serves
to actively scan for vulnerabilities on a continuous basis and interpret
the resulting traffic in context of policy is provided. Vulnerability
information is presented within an enterprise manager system enabling the
user to access vulnerability information, recommended remediation
procedures, and associated network traffic. A studio mechanism is used to
add scanners to the appropriate policies and control the scope and
distribution of scans within the target network.