Desktop Protection Guides (Premium Protection, Internet Security, Antivirus)

Find all the help you need with detailed guides to the different aspects of BullGuard Desktop/PC protection

Monitoring Vulnerabilities

The Vulnerability Scanner runs in the background. Setting the module to OFF in BullGuard > Settings turns off this process.

To retrieve data in real-time from the Vulnerability Scanner click the menu   drop down button from the Vulnerabilities section in the main BullGuard window and select Status.

 

 

VUS02

 

The Vulnerability Scanner will scan Windows for missing security updates along with the configuration of the Windows update functionality, checks the system for potential risks such as connections to unsecured WiFi networks; checks whether applications from removable devices are executed automatically and if all device drivers are digitally signed. 

 

 

VUS03

The Vulnerabilities window opens, displaying a detailed list with everything that was scanned for and whether any action is recommended.

 

 

VUS09

The areas inspected by the Vulnerability Scanner are:

  -  Wireless network safety: checks if you are connected to a vulnerable Wi-Fi network (no password, or WPS enabled).
  -  Automatically run programs from removable devices (autorun.inf): checks for automatic execution of media files (autorun.inf) on local hard drives and network hard drives.
  -  Missing Windows security updates: checks for missing Windows security updates and lets you display them.

  -  Windows Updates configuration: checks if your Windows operating system is configured to download and install security updates in the background.
  -  Digitally signed device drivers: checks if there are any drivers that are not digitally signed by Microsoft.


Results

The overall status result is displayed on the left side of the screen. If no vulnerabilities were detected, a green check mark is displayed.

If vulnerabilities were found, the number of vulnerabilities is being displayed on the left side of the screen. On the right side of the screen, the vulnerabilities are highlighted with a red exclamation mark. By pressing the red horisontal arrow corresponding to a vulnerability, a new screen will open providing you with additional information and actions to be taken to remedy the vulnerability. 

Was This Helpful?

We use cookies to ensure that we give you the best experience on our website. By continuing to browse, we are assuming that you have no objection in accepting cookies. You can change your cookie settings at any time.