Vulnerability Scan Methods

Vulnerability scan checks the presence of security software on host machines and can install the Security Agent to unprotected host machines.



Manual vulnerability scan

Administrators can run vulnerability scans on demand.

Scheduled vulnerability scan

Vulnerability scans automatically run according to the schedule configured by administrators.

After Vulnerability Scanner runs, it displays the status of the Security Agent on the target host machines. The status can be any of the following:

  • Normal: The Security Agent is up and running and is working properly

  • Abnormal: The Security Agent services are not running or the Security Agent does not have real-time protection

  • Not installed: The TMListen service is missing or the Security Agent has not been installed

  • Unreachable: Vulnerability Scanner was unable to establish connection with the host machine and determine the status of the Security Agent