Chapter 3. Testing Your System’s Vulnerability
This chapter describes ways to test the vulnerability of your system to outside threats by
scanning your system. The test is available directly from Sygate using an online connection.
Scanning Your System
Assessing your vulnerability to an attack is one of the most important steps that you can take
to ensure that your device is protected from possible intruders. With what you learn from
this battery of tests, you can more effectively set the various options on your Agent to
protect your device from attack.
To scan your system:
1.
Do one of the following:
o
On the toolbar, click the
Security
Test
button.
o
On the
Tools
menu, click
Test Your System Security
.
o
In your Internet browser window, open the Sygate Technologies web page
(http://scan.sygate.com) directly.
2.
On the web page, click
Scan Now
. The Sygate Online Services scanner scans your
computer and attempts to determine your IP address, operating system, web
browser, and other information about your system.
3.
For a specific type of scan, click one of the following web pages:
o
Quick Scan
o
Stealth Scan
o
Trojan Scan
o
TCP Scan
13