Threat scans

Threat scans can be performed to find known malware and suspicious URLs and IP addresses.

These scans can be initiated from the catalog, via email, or by creating a scan request for the files, file hashes, URLs, or IP addresses you want to check. The scans will be performed by the appropriate third-party scanner.