Discusses automated tools for testing computer system vulnerability. Examines basic requirements for vulnerability testing tools & describes the different functional classes of tools. Offers general recommendations about the selection & distribution of such tools.