Vulnerability identification through unauthenticated network scanning is a good way to start gathering intelligence on a network, but a powerful component of this is the ability to perform more frequent, targeted scans, and this can include credentials that allow for the successful authentication to a target system for deeper level evaluations.
Features that make OpenVAS more powerful include highly configurable scan configurations, scheduled tasks, automated reporting, and alerting.
Aside from the default scan configurations that are present in the OpenVAS dashboard, it also contains some very flexible options, including scheduled scans and customized scan types. We will be looking at customized scan configurations.