This chapter describes how to protect endpoints from security risks using file-based scanning.
Topics include: