Specifications

Trend Micro™ OfficeScan™ 10 Administrator’s Guide
3-30
Using Vulnerability Scanner
Use Vulnerability Scanner to detect installed antivirus solutions, search for unprotected
computers on the network, and install OfficeScan™ clients to computers. To determine
if computers are protected, Vulnerability Scanner pings ports normally used by antivirus
solutions.
Vulnerability Scanner Functions
Vulnerability Scanner performs the following functions:
Monitor the network for Dynamic Host Configuration Protocol (DHCP) requests
so that when computers first log on to the network, Vulnerability Scanner can
determine their status.
Ping computers on the network to check their status and retrieve their computer
names, platform versions, and descriptions.
Determine the antivirus solutions installed on the network. Vulnerability scanner
can detect Trend Micro™ products and third-party antivirus solutions (including
Norton AntiVirus™ Corporate Edition and McAfee™ VirusScan™ ePolicy
Orchestrator™).
Send scan results through email or export results to a comma-separated value (CSV)
file.
Considerations When Using Vulnerability Scanner
To help you decide whether to use Vulnerability Scanner, consider the following:
Network Administration
TABLE 3-12. Network administration
SETUP EFFECTIVENESS OF VULNERABILITY SCANNER
Administration with strict
security policy
Very effective. Vulnerability Scanner reports
whether or not all computers have antivirus soft-
ware installed.
Administrative responsi-
bility distributed across
different sites
Moderately effective