Hello, One of our customers uses Cisco Meraki for its network infrastructure, and as part of the PCI DSS requirements, we need to perform authenticated vulnerability scans. We have tested several approaches to initiate authenticated scans through Qualys, but unfortunately, none of them have been successful so far. Do you have any recommendations or guidance on how this could be achieved, or alternative approaches that would be acceptable in this context? Thank you in advance. Kind regards,
... View more