Vulnerability assessment for macOS devices

You can scan macOS devices for operating system-level and application-level vulnerabilities.

To configure the vulnerability assessment for macOS devices

  1. In the Cyber Protect console, create a protection plan and enable the Vulnerability assessment module.
  2. Specify the vulnerability assessment settings:

    • What to scan – select Apple products, macOS third-party products, or both.
    • Schedule – define the schedule for performing the vulnerability assessment.

    For more information about the Schedule options, see Vulnerability assessment settings.

  3. Assign the plan to the macOS devices.

After a vulnerability assessment scan, you can see a list of found vulnerabilities. You can process the information and decide which of the found vulnerabilities must be fixed.

To monitor the results of the vulnerability assessment, see the Monitoring > Overview > Vulnerabilities / Existing vulnerabilities widgets.