You can anytime choose to run on demand risk scan tasks on selected endpoints, as follows:
Go to the Network page.
Browse the containers from the left-side pane and select the endpoints you want to scan.
Click the Tasks button at the upper side of the table and choose Risk scan.
A configuration page will appear, where you need to select the indicators taken into account for risk scanning.
Note
An Indicator of Risk refers to a registry key value or data of a specific system setting.
Select the indicators of risk you want to take into account for scanning.
Indicators of risk are grouped by the following attributes:
Category (Network, Operating System)
Severity (Misconfiguration, Microsoft Security Baseline)
By default, only a certain number of indicators are selected. You may need to review the list of indicators you want to include for scanning.
You can also use the search bar to find specific indicators. Note that risk indicator names include terms from local or group policy names. To view the full list of indicators and their description, refer to GravityZone Indicators of Risk.
Click Save to create the scan task. A confirmation message will appear.
Important
The Risk scan tasks will not run / will fail on endpoints in the following situations:
The endpoint does not have a Windows operating system.
The endpoint’s Bitdefender agent license is invalid.
The policy applied to endpoint has the Risk Management module disabled.
You can view and manage the task on the Network > Tasks page. For more information, refer to Viewing and managing tasks.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS