The host-based scans can be delivered in various ways depending upon the target user-base, network topologies involved and device types. Currently, Risk Intelligence supports the following primary scan delivery methods:
|Scan via Command Line Executable (CLI) and Systems Management||These are the most versatile deployment methods. Can be scripted or deployed via Systems Management tools.||
Use this when you have other scripting requirements or are using systems management tools:
For details on how to set up and run scans using the version of Risk Intelligence that is integrated with RMM, see RMM - Risk Intelligence Integration.
|Scan via Browser||A URL that can be opened in a web browser to scan the local computer.||
Use this when you want to scan your own computer, or for completely un-managed devices on your network. Available options: