Scan Your Devices
- Click on Scan Computers in the left Navigation panel.
- Make sure the organization you want to scan is selected in Step1: Choose Organization.
- In Step 2: Choose a Scan Type, click to select from the list of scan configurations available. The defaults are:
- Expanded Data Breach Risk - Developed to help MSPs and their customers identify a wide range of Personally Identifiable Information (PII) on their endpoints. This expanded version of the Data Breach Risk scan has three components:
- Security scan - identifies OS and application vulnerabilities
- Technical Safeguards - Tests for 18 baseline Windows end-point configurations
- PII Data Discovery - Scans local and network devices for unencrypted personally identifiable information (PII) from 16 countries and regions.
- Data Breach Risk Scan - Data scan which combines the Data Discovery scan and the Security scan and searches for credit cards, social security numbers, driver's license, date of birth etc. This is the most widely used scan. For information on how to set up and run a Data Breach Risk Scan on the various endpoints in your organization, see Data Breach Risk Quick Start Guide Introduction.
- PCI Scan - Data scan which combines the Security scan with some configuration checks (e.g. password history and screen-saver password-protected).
- PAN Scan - Data scan that searches for unprotected credit card details.
- PCI and PAN Scan - Data scan which combines the PCI and PAN scans.
- Security Scan - Scans security patches and vulnerabilities.
- Data Discovery Scan - Versatile data scan that searches for unprotected credit card details, social security numbers, drivers license details, date of birth etc. This scan is highly customizable so almost any type of data can be found.
- File Finder Scan - Finds files by file name, partial name or hash (MD5, SHA1 and SHA256) and reveals access permissions to files with suspect data.
- In Step 3: Choose Scan Delivery Method, there are various scan delivery options to choose from. Select the method you want to use. The instructions you need to follow are then displayed on the page.
- Follow the instructions provided to start scanning your devices.
For a full list of scan configurations, see Scan Configurations.
You can also create your own custom scan configurations. For more information, see Create Custom Scan Configuration.
Each of the scan delivery methods is discussed in Choosing a Scan Delivery Method.
The time taken to run a scan depends on a variety of factors: the amount of data to be scanned; the amount of used space; the scan type (Data Breach Risk and PCI & PAN scans generally take the longest); the network conditions e.g. internet speed and device usage. Run times can range from a few minutes to several hours or several days for huge amounts of data.
Once your devices have been scanned, you can look at what risks and vulnerabilities the scan has uncovered on single and multiple devices using the Reporting tool - and then go on to remediate any issues you may have.