Specifications

5-1
Chapter 5
Protecting Computers from Security
Risks
Topics in this chapter:
About Security Risks on page 5-2
Scan Methods on page 5-8
Scan Types on page 5-19
Settings Common to All Scan Types on page 5-25
Scan-related Privileges on page 5-43
Global Scan Settings on page 5-43
Security Risk Notifications on page 5-44
Security Risk Logs on page 5-48
Outbreak Protection on page 5-57
Device Control on page 5-65