Skip to main content

Device Scan

Perform a security analysis on all devices to detect active threats and pending vulnerabilities.

Updated over 10 months ago

How does it work?

The scan checks files, configurations, and processes for potential threats or vulnerabilities. It runs automatically or on demand.

Real Example:

A company runs a mass scan and detects several devices with outdated software containing critical vulnerabilities, allowing them to patch before an attack occurs.

Did this answer your question?