How does it work?
The scan checks files, configurations, and processes for potential threats or vulnerabilities. It runs automatically or on demand.
Real Example:
A company runs a mass scan and detects several devices with outdated software containing critical vulnerabilities, allowing them to patch before an attack occurs.