Vulnerability assessment for macOS devices
You can scan macOS devices for operating system-level and application-level vulnerabilities.
To configure the vulnerability assessment for macOS devices
- In the Cyber Protect console, create a protection plan and enable the Vulnerability assessment module.
-
Specify the vulnerability assessment settings:
- What to scan – select Apple products, macOS third-party products, or both.
-
Schedule – define the schedule for performing the vulnerability assessment.
For more information about the Schedule options, see Vulnerability assessment settings.
- Assign the plan to the macOS devices.
After a vulnerability assessment scan, you can see a list of found vulnerabilities. You can process the information and decide which of the found vulnerabilities must be fixed.
To monitor the results of the vulnerability assessment, see the Monitoring > Overview > Vulnerabilities / Existing vulnerabilities widgets.