This chapter describes how to protect endpoints from security risks using file-based scanning.
Topics include:
About Security Risks
Scan Method Types
Scan Types
Settings Common to All Scan Types
Scan Privileges and Other Settings
Global Scan Settings
Security Risk Notifications
Security Risk Logs
Security Risk Outbreaks