Skip to main content

Vulnerability Scan

Identify and address security gaps in your systems.

Updated over a year ago

The Vulnerability Scan is an essential feature of BlackfishID, designed to protect your Windows and macOS devices from potential security breaches that cybercriminals could exploit. This tool leverages advanced SentinelOne technology to perform detailed, scheduled scans, helping to identify and remediate vulnerabilities before they become critical issues.


How does it work?

Vulnerability scans in BlackfishID are preconfigured to run automatically once a week, ensuring continuous monitoring of your devices and systems. During each scan, the software analyzes configurations, applications, and potential security gaps that could compromise your devices.

If a vulnerability is detected, a real-time alert is generated in the platform, along with specific recommendations to resolve the issue quickly and effectively.


Available actions in the platform:

From the centralized BlackfishID console, you can perform the following vulnerability-related actions:

  • Initiate manual scan: Run an immediate scan in case of suspected vulnerabilities.

  • Update software: Ensure all installed programs are updated to their most secure versions.

  • Isolate device: Disconnect compromised devices from the network to prevent further damage.

  • Delete suspicious files: Remove any files identified as potentially harmful.


Benefits of Vulnerability Scan:

  1. Proactive detection: Identify vulnerabilities before they can be exploited.

  2. Scheduled automation: Perform weekly scans without manual intervention.

  3. Centralized management: Monitor the security status of all devices from a single dashboard.

  4. Practical recommendations: The platform provides clear instructions to address detected vulnerabilities.


Relation to other security controls:

The Vulnerability Scan is closely linked to Device Protection and Secure Browsing, creating a comprehensive security ecosystem to effectively safeguard your digital infrastructure.

Did this answer your question?