Cloud Edge can scan endpoint devices for vulnerabilities based on the CVE list, as well as weak passwords. In addition, Cloud Edge can use advanced recognition mode to identify open ports and identify the endpoint device category.
After running a vulnerability scan, the scan results are shown on the following screens:
Endpoint Devices: This screen shows a filterable list of endpoint devices, the severity of each endpoint device, and the amount of vulnerabilities on each endpoint device. For more details, see Endpoint Devices.
Endpoint Device Details: This screen shows detailed device information and vulnerabilities on the endpoint device. For more details, see Endpoint Device Details.
Device Categories Requiring Attention: Located in the Device Map & Security tab of the Dashboard, this widget shows the network topology as well as the amount of endpoint devices with vulnerabilities, Internet security, and policy enforcement.