Topics on this page
Enhanced recommendation scan
The enhanced recommendation scan improves upon the classic recommendation scan in the following ways:
- The enhanced recommendation scan automatically scans at least once every 24 hours. This scan is short and efficient to avoid disrupting operations.
- Improved efficiency allows more frequent scans for improved protection. Expect significantly lower use of system resources.
- Reliable scans. Fewer failed scans means you can rely on the enhanced recommendation scan to provide regular recommendations.
- More accurate with fewer incorrect or unnecessary recommendations.
- Optimized performance with recommendations based on security rules that you require.
- Fewer limitations than the classic recommendation scan. The few exceptions include the following:
- If web browsers are the only applicable vector for Java-related vulnerabilities, the scanner does not recommend such rules.
- For Unix and Linux operating systems, the scan engine might have trouble detecting software that is not installed through the operating system's default package manager. Applications installed using standard package managers do not have this problem.
- Scheduled enhanced recommendation scans automatically implement recommendations based on the last results.
- Ongoing enhanced recommendation scans automatically implement recommendations based on the last results.
- Recommendation information is not available on the policy pages when using enhanced recommendation scan.
Manually run an enhanced recommendation scan
Scan for recommendations is similar to the classic recommendation scan but with a timeout for receiving results within 10 minutes. Clicking Scan for Recommendations disables the button during this timeout. If the recommendation scan results take longer than 10 minutes, the button becomes available so you can try again. In addition to manually running the enhanced recommendation scan, you can also configure scheduled scans and ongoing scans.
-
Click the module where you want to run the scan:
- Integrity Monitoring
- Intrusion Prevention
- Log Inspection
-
On the General tab under recommendations, click Scan for Recommendations.
The results of the latest enhanced recommendation scan appear on the General tab of the Intrusion Prevention, Integrity Monitoring, or Log Inspection protection module.