Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
3-30
Using Vulnerability Scanner
Use Vulnerability Scanner to detect installed antivirus solutions, search for unprotected
computers on the network, and install OfficeScan™ clients to computers. To determine
if computers are protected, Vulnerability Scanner pings ports normally used by antivirus
solutions.
Vulnerability Scanner Functions
Vulnerability Scanner performs the following functions:
• Monitor the network for Dynamic Host Configuration Protocol (DHCP) requests
so that when computers first log on to the network, Vulnerability Scanner can
determine their status.
• Ping computers on the network to check their status and retrieve their computer
names, platform versions, and descriptions.
• Determine the antivirus solutions installed on the network. Vulnerability scanner
can detect Trend Micro™ products and third-party antivirus solutions (including
Norton AntiVirus™ Corporate Edition and McAfee™ VirusScan™ ePolicy
Orchestrator™).
• Send scan results through email or export results to a comma-separated value (CSV)
file.
Considerations When Using Vulnerability Scanner
To help you decide whether to use Vulnerability Scanner, consider the following:
Network Administration
TABLE 3-12. Network administration
SETUP EFFECTIVENESS OF VULNERABILITY SCANNER
Administration with strict
security policy
Very effective. Vulnerability Scanner reports
whether or not all computers have antivirus soft-
ware installed.
Administrative responsi-
bility distributed across
different sites
Moderately effective










