instvs
Use Vulnerability Scanner to detect installed antivirus solutions, search for unprotected computers on the network, and install OfficeScan clients to computers.
To help you decide whether to use Vulnerability Scanner, consider the following:
Network Administration
Network Administration |
Setup |
Effectiveness of Vulnerability Scanner |
Administration with strict security policy |
Very effective. Vulnerability Scanner reports whether all computers have antivirus software installed. |
Administrative responsibility distributed across different sites |
Moderately effective |
Centralized administration |
Moderately effective |
Outsource service |
Moderately effective |
Users administer their own computers |
Not effective. Because Vulnerability Scanner scans the network for antivirus installations, it is not feasible to have users scan their own computers. |
Network Topology and Architecture
Network Topology and Architecture |
Setup |
Effectiveness of Vulnerability Scanner |
Single location |
Very effective. Vulnerability Scanner allows you to scan an entire IP segment and install the OfficeScan client easily on the LAN. |
Multiple locations with high speed connection |
Moderately effective |
Multiple locations with low speed connection |
Not effective. You need to run Vulnerability Scanner on each location and OfficeScan client installation must be directed to a local OfficeScan server. |
Remote and isolated computers |
Not effective. Vulnerability Scanner cannot scan computers not connected to the network. |
Software/Hardware Specifications
Software/Hardware Specifications |
Setup |
Effectiveness of Vulnerability Scanner |
Windows NT-based operating systems |
Very effective. Vulnerability Scanner can easily install the OfficeScan client remotely to computers running NT-based operating systems. |
Mixed operating systems |
Moderately effective. Vulnerability Scanner can only install to computers running Windows NT-based operating systems. |
Desktop management software |
Not effective. Vulnerability Scanner cannot be used with desktop management software. However, it can help track the progress of the OfficeScan client installation. |
Domain Structure
Domain Structure |
Setup |
Effectiveness of Vulnerability Scanner |
Microsoft Active Directory |
Very effective. Specify the domain administrator account in Vulnerability Scanner to allow remote installation of the OfficeScan client. |
Workgroup |
Not effective. Vulnerability Scanner may have difficulty installing to computers using different administrative accounts and passwords. |
Novell™ Directory Service |
Not effective. Vulnerability Scanner requires a Windows Domain account to install the OfficeScan client. |
Peer-to-peer |
Not effective. Vulnerability Scanner may have difficulty installing to computers using different administrative accounts and passwords. |
Network Traffic
Network Traffic |
Setup |
Effectiveness of Vulnerability Scanner |
LAN connection |
Very effective |
512 Kbps |
Moderately effective |
T1 connection and higher |
Moderately effective |
Dialup |
Not effective. It will take a long time to finish installing the OfficeScan client. |
Network Size
Network Size |
Setup |
Effectiveness of Vulnerability Scanner |
Very large enterprise |
Very effective. The bigger the network, the more Vulnerability Scanner is needed for checking OfficeScan client installations. |
Small and medium business |
Moderately effective. For small networks, Vulnerability Scanner can be an option to install the OfficeScan client. Other client installation methods may prove much easier to implement. |
Vulnerability Scanner will not install the client if:
The OfficeScan server or another security software is installed on the target host machine.
The remote computer runs Windows XP Home, Windows Vista Home Basic, Windows Vista Home Premium, Windows 7 Starter, Windows 7 Home Basic, or Windows 7 Home Premium.
You can install the client to the target host machine using the other installation methods discussed in Installation Methods.
Before using Vulnerability Scanner to install the client, perform the following steps:
For Windows Vista (Business, Enterprise, or Ultimate Edition) or Windows 7 (Professional, Enterprise, or Ultimate Edition):
Enable a built-in administrator account and set the password for the account.
Click Start > Programs > Administrative Tools > Windows Firewall with Advanced Security.
For Domain Profile, Private Profile, and Public Profile, set the firewall state to "Off".
Open Microsoft Management Console (click Start > Run and type services.msc) and start the Remote Registry service. When installing the OfficeScan client, use the built-in administrator account and password.
For Windows XP Professional (32-bit or 64-bit version):
Open Windows Explorer and click Tools > Folder Options.
Click the View tab and disable Use simple file sharing (Recommended).
See also: