Get Involved
Query: List TLS protocols by count
Description
Determine the frequency of different TLS protocols for a specific scan to analyze security measures. This can be crucial in identifying potential vulnerabilities and ensuring robust security protocols are in place.
Query
Tables used in this query: