Vulnerability scan checks the presence of security software on host machines and can install the Security Agent to unprotected host machines.
Method |
Details |
---|---|
Manual vulnerability scan |
Administrators can run vulnerability scans on demand. |
Scheduled vulnerability scan |
Vulnerability scans automatically run according to the schedule configured by administrators. |
After Vulnerability Scanner runs, it displays the status of the Security Agent on the target host machines. The status can be any of the following:
Normal: The Security Agent is up and running and is working properly
Abnormal: The Security Agent services are not running or the Security Agent does not have real-time protection
Not installed: The TMListen service is missing or the Security Agent has not been installed
Unreachable: Vulnerability Scanner was unable to establish connection with the host machine and determine the status of the Security Agent