http://172.19.1.196:8983/solr/secweb/select?q=ranges OR "Ranges" OR "Intervals"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field=key_sitemap&facet.field=system_name&facet.field=key_keywords&hl=on&hl.fragsize=200&hl.fl=id,title_th,searchcontent_th&defType=edismax&qf=searchcontent_th&qf=id&qf=title_th^1000000&pf=title_th~5^1&pf=searchcontent_th~5^10000&ps=2&mm=100&qf=title_th_default&fq=key_filetype%3Adoc&start=0&rows=10
the process of running automated tools against defined IP addresses or IP ranges to identify known vulnerabilities in the CS environment. A report is generated and IT team will assess and manage system