Scanning for Security Risks

This chapter describes how to protect endpoints from security risks using file-based scanning.

Topics include: