Deleting Devices; Performing Scans; Starting A Scan - McAfee MTP08EMB3RUA - Total Protection - PC Product Manual

Product guide
Hide thumbs Also See for MTP08EMB3RUA - Total Protection - PC:
Table of Contents

Advertisement

9
Using Vulnerability Scanning

Performing scans

Deleting devices

Use this task to delete devices from your account.
Task
Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the
1
Dashboard page of the SecurityCenter).
From the Security Dashboard page of the vulnerability scanning portal, under Audits, select Devices.
2
Select a device using one of these methods:
3
• On the Devices page, click the device name.
• On the Device Groups page, click the name of the group containing the device, then on the
Devices page, click the device name.
A page listing details about the selected device is displayed.
4
Click Configure, then click the Delete tab.
5
Enter the reason for deleting the device, select the checkbox to acknowledge that you understand
what happens when a device is deleted, then click Request. It takes about an hour for the device to
be deleted from your account.
Performing scans
Use these tasks to set up and run vulnerability scans on devices you have added to your account.

Starting a scan

Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address, domain, or
network.
Task
Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the
1
Dashboard page of the SecurityCenter).
From the Security Dashboard page of the vulnerability scanning portal, under Security, select Scans.
2
3
From the Security Scans page, click On Demand.
For each type of scan, the devices you have added to your account are listed.
IP addresses are listed under Audit. (You can filter the listing by selecting a group from the top
drop-down list.)
Networks are listed under Port Discovery.
Domains are listed under DNS Discovery.
154
McAfee Total Protection Service 5.1.5 Product Guide
Deleting a device permanently deletes all related security data including
vulnerability reports. This data cannot be restored.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection service 5.1.5

Table of Contents