Vulnerability scan checks the presence of security software on host machines and can install the Security Agent to unprotected host machines.
Method  | 
Details  | 
|---|---|
Manual vulnerability scan  | 
Administrators can run vulnerability scans on demand.  | 
Scheduled vulnerability scan  | 
Vulnerability scans automatically run according to the schedule configured by administrators.  | 
After Vulnerability Scanner runs, it displays the status of the Security Agent on the target host machines. The status can be any of the following:
Normal: The Security Agent is up and running and is working properly
Abnormal: The Security Agent services are not running or the Security Agent does not have real-time protection
Not installed: The TMListen service is missing or the Security Agent has not been installed
Unreachable: Vulnerability Scanner was unable to establish connection with the host machine and determine the status of the Security Agent
		