Premium Protection Guides

Find all the help you need with detailed guides to the different aspects of BullGuard protection

Vulnerability Scanner Module Overview

Plugin available with

The main section for the Vulnerability Scanner provides you with access to the module’s main functions through the More Actions (...) button.

 

 

VUS02

 

 

Scan: clicking on this button will start a general sweep of the computer looking for security issues.

 

Reports:  Takes you to the Messaging Center Main14 > Vulnerabilities > Activity section, from which you can open the report showing what issues the Vulnerability plugin scanned for and what the results were.

 

Settings: opens a new section, where you can turn the Vulnerability Scanner on and off and set up a scanning schedule.

Introducing the Vulnerability Scanner

 

By updating the operating system and taking other preventive measures, you can minimize the risk of third parties gaining access to your computer and information through various means.
 
For this purpose BullGuard’s Vulnerability Scanner module scans for missing security updates and checks for other potential risks such as connections to unsecured WiFi networks, whether applications from removable devices are executed automatically, whether all device drivers are digitally signed and others.

Why the need for a Vulnerability Scanner?

 

Threats against user security are numerous and several methods are employed - varying from viral infections to identity theft. Such methods are particularly successful when targeting people with seriously outdated operating systems on their computers. While rare, such attacks are often very destructive and the end result is usually:
 

  • Windows and installed applications start malfunctioning and the entire system stability is threatened.

     
  • The computer becomes a threat to any networks they are connected to because infections originating from their computer can spread within the network.

     
  • Serious malware infections may steal important private information (login credentials, e-mail address books or instant messaging contacts).

     
  • Attackers gain access to computers and can disrupt any on-going activity (in some cases, attackers have been able to password protect user documents).