Choosing a Scan Delivery Method
The host-based scans can be delivered in various ways depending upon the target user-base, network topologies involved and device types. Currently, Risk Intelligence supports the following primary scan delivery methods:
Method | Description | Use Case |
---|---|---|
Scan via Command Line Executable (CLI) and Systems Management | These are the most versatile deployment methods. Can be scripted or deployed via Systems Management tools. |
Use this when you have other scripting requirements or are using systems management tools:
For details on how to set up and run scans using the version of Risk Intelligence that is integrated with RMM, see RMM - Risk Intelligence Integration. |
Scan via Browser | A URL that can be opened in a web browser to scan the local computer. |
Use this when you want to scan your own computer, or for completely un-managed devices on your network. Available options:
|