Description: Part of network security products is the vulnerability scanning tools. It is used to find these problems which exist in network. It is also used to find vulnerability by hackers. This event is generated when the network was scanned.
Corrective: Determine whether or not the scan was legitimate then look for other Events concerning the attacking IP address. Check the host for signs of compromise.