Risk Intelligence Help

Choosing a Scan Delivery Method

The host-based scans can be delivered in various ways depending upon the target user-base, network topologies involved and device types. Currently, Risk Intelligence supports the following primary scan delivery methods:

Method Description Use Case
Scan via Command Line Executable (CLI) and Systems Management These are the most versatile deployment methods. Can be scripted or deployed via Systems Management tools.

Use this when you have other scripting requirements or are using systems management tools:

For details on how to set up and run scans using the version of Risk Intelligence that is integrated with RMM, see RMM - Risk Intelligence Integration.

Scan via Browser A URL that can be opened in a web browser to scan the local computer.

Use this when you want to scan your own computer, or for completely un-managed devices on your network. Available options:

  • Email - Generated text with URL can be pasted into your mail tool and sent to users so that they can scan their device(s). Simply enter the URL in the browser and follow the on-screen instructions.
  • URL - Generates the URL to initiate the scan. Enter in a browser and follow the on-screen instructions.
  • Scan Now Button - Copy and paste the generated code to integrate a scan now button. When pressed, the scan is initiated on your computer.
  • HTML / Javascript Integration - Copy and paste the generated code using the browser scan.