Vulnerability scan checks the presence of security software
on host machines and can install the Security Agent to
unprotected host machines.
Method
|
Details
|
Manual vulnerability scan
|
Administrators can run vulnerability scans
on demand.
|
Scheduled vulnerability scan
|
Vulnerability scans automatically run according
to the schedule configured by administrators.
|
After Vulnerability Scanner runs, it displays the status of the Security Agent on the target
host machines. The status can be any of the following:
-
Normal: The Security Agent is up and running and is working properly
-
Abnormal: The Security Agent services are not running or the Security Agent does not have real-time protection
-
Not installed: The TMListen service is missing or the Security Agent has not been installed
-
Unreachable: Vulnerability Scanner was unable to establish connection with the host machine and determine the status of the Security Agent