Performing Threat Analysis for Virtual Machines

You can perform threat analysis on virtual machines using one of the following methods:

  • Run an on-demand threat analysis with an out-of-place full VM restore from the Command Center.

  • Schedule threat analysis with an out-of-place full VM restore using the Virtual Machine Threat Analysis Scan workflow.

  • Schedule threat analysis with a disk-only restore (without restoring the full VM) using dedicated workflows.

×

Loading...