You can perform threat analysis on virtual machines using one of the following methods:
-
Run an on-demand threat analysis with an out-of-place full VM restore from the Command Center.
-
Schedule threat analysis with an out-of-place full VM restore using the Virtual Machine Threat Analysis Scan workflow.
-
Schedule threat analysis with a disk-only restore (without restoring the full VM) using dedicated workflows.