Specifications

Installing the OfficeScan Client
3-31
Network Topology and Architecture
Centralized administra-
tion
Moderately effective
Outsource service Moderately effective
Users administer their
own computers
Not effective. Because Vulnerability Scanner scans
the network for antivirus installation, it is not feasi-
ble to have users scan their own computers.
TABLE 3-13. Network topology and architecture
SETUP EFFECTIVENESS OF VULNERABILITY SCANNER
Single location Very effective. Vulnerability Scanner allows you to
scan an entire IP segment and install OfficeScan
client easily on the LAN.
Multiple locations with
high speed connection
Moderately effective
Multiple locations with
low speed connection
Not effective. You need to run Vulnerability Scan-
ner on each location and OfficeScan client installa-
tion must be directed to a local OfficeScan server.
Remote and isolated
computers
Not effective. Vulnerability Scanner cannot scan
computers not connected to the network.
TABLE 3-12. Network administration (Continued)
SETUP EFFECTIVENESS OF VULNERABILITY SCANNER