Use Vulnerability Scanner to detect installed antivirus solutions, search for unprotected computers on the network, and install OfficeScan™ clients to computers. To determine if computers are protected, Vulnerability Scanner pings ports normally used by antivirus solutions.
Vulnerability Scanner performs the following functions:
Monitor the network for Dynamic Host Configuration Protocol (DHCP) requests so that when computers first log on to the network, Vulnerability Scanner can determine their status.
Ping computers on the network to check their status and retrieve their computer names, platform versions, and descriptions.
Determine the antivirus solutions installed on the network. Vulnerability scanner can detect Trend Micro™ products and third-party antivirus solutions (including Norton AntiVirus™ Corporate Edition and McAfee™ VirusScan™ ePolicy Orchestrator™).
Send scan results through email or export results to a comma-separated value (CSV) file.
To help you decide whether to use Vulnerability Scanner, consider the following:
Network Administration
Network administration |
Setup |
Effectiveness of Vulnerability Scanner |
Administration with strict security policy |
Very effective. Vulnerability Scanner reports whether or not all computers have antivirus software installed. |
Administrative responsibility distributed across different sites |
Moderately effective |
Centralized administration |
Moderately effective |
Outsource service |
Moderately effective |
Users administer their own computers |
Not effective. Because Vulnerability Scanner scans the network for antivirus installation, it is not feasible to have users scan their own computers. |
Network Topology and Architecture
Network topology and architecture |
Setup |
Effectiveness of Vulnerability Scanner |
Single location |
Very effective. Vulnerability Scanner allows you to scan an entire IP segment and install OfficeScan client easily on the LAN. |
Multiple locations with high speed connection |
Moderately effective |
Multiple locations with low speed connection |
Not effective. You need to run Vulnerability Scanner on each location and OfficeScan client installation must be directed to a local OfficeScan server. |
Remote and isolated computers |
Not effective. Vulnerability Scanner cannot scan computers not connected to the network. |
Software/Hardware Specifications
Software/Hardware specifications |
Setup |
Effectiveness of Vulnerability Scanner |
Windows NT-based operating systems |
Very effective. Vulnerability Scanner can easily install the OfficeScan client remotely to computers running NT-based operating systems, except Windows XP Home. |
Mixed operating systems |
Moderately effective. Vulnerability Scanner can only install to computers running Windows NT-based operating systems. |
Desktop management software |
Not effective. Vulnerability Scanner cannot be used with desktop management software. However, it can help track the progress of OfficeScan client installation. |
Domain Structure
Domain structure |
Setup |
Effectiveness of Vulnerability Scanner |
Microsoft Active Directory |
Very effective. Specify the domain administrator account in Vulnerability Scanner to allow remote installation of the OfficeScan client. |
Workgroup |
Not effective. Vulnerability Scanner may have difficulty installing to computers using different administrative accounts and passwords. |
Novell™ Directory Service |
Not effective. Vulnerability Scanner requires a Windows Domain account to install the OfficeScan client. |
Peer-to-peer |
Not effective. Vulnerability Scanner may have difficulty installing to computers using different administrative accounts and passwords. |
Network Traffic
Network traffic |
Setup |
Effectiveness of Vulnerability Scanner |
LAN connection |
Very effective |
512 Kbps |
Moderately effective |
T1 connection and higher |
Moderately effective |
Dialup |
Not effective. It will take a long time to finish installing the OfficeScan client. |
Network Size
Network size |
Setup |
Effectiveness of Vulnerability Scanner |
Very large enterprise |
Very effective. The bigger the network, the more Vulnerability Scanner is needed for checking OfficeScan client installations. |
Small and medium business |
Moderately effective. For small networks, Vulnerability Scanner can be an option to install the OfficeScan client. Other client installation methods may prove much easier to implement. |
Perform the following tasks from Vulnerability Scanner:
You can launch Vulnerability Scanner on a computer other than the OfficeScan server computer. Ensure that the other computer runs Windows 2000, 2003, and 2008. You cannot launch the tool on Windows XP, Vista, or from Terminal Server.
To launch Vulnerability Scanner on another computer:
Connect to the OfficeScan server computer.
Copy the TMVS folder in <Server installation folder>\PCCSRV\Admin\Utility to the other computer.
After copying the TMVS folder, double-click TMVS.exe.