Risk Intelligence Help

CLI Scanner Deployment Scenarios

There are a variety of ways to distribute the CLI scan to endpoints in your organization. Since the CLI scanner does not require it to be installed on the actual device being scanned, it can be located on a network share and then created as a scheduled task or a cron job on Linux devices.

Most common deployment scenarios leverage Microsoft Active Directory. The Risk Intelligence application shows detailed step-by-step directions for running scans via Active Directory directly from the console. Simply choose Active Directory as the Scan Delivery Method and follow the steps. See Scanning via Active Directory.

All of the CLI scan delivery methods come with instructions. Select the method and follow the instructions that are displayed.

The CLI scan can be run by any endpoint management tool that can execute a command on an endpoint including but not limited to:

  • Microsoft System Center
  • cron jobs
  • Login script
  • VPN on connect script

Refer to your management solution documentation for instructions on how to execute a scheduled task on the desired endpoints.