According to the scan results (and knowledgebase) for devices identified as netscreen (QID 45017) there is a known vulnerability (QID 43082) that hoses the system upon being port scanned. This results in the web services port(s) not being scanned (QID 86509) as a workaround to not knock the box over. My question is: Is this still the case for the heartbleed checks? I assume (shudder), the port scan needed to be modified to check for the heartbleed vulnerability? If so, is the netscreen workaround still enforced? I.E. the netscreen devices will still not be scanned on the affected ports? Just wanted to verify. Thanks.