You can schedule threat analysis using disk-only restore workflows, which do not require full VM restores. This method is recommended for environments with multiple virtual machines or for scenarios where consistent, repeatable scanning is necessary.
×