Thank you for your feedback.
Form temporarily unavailable. Please try again or contact docfeedback@servicenow.com to submit your comments.
Versions
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store
Close

Threat scans

Threat scans can be performed to find known malware and suspicious URLs and IP addresses.

These scans can be initiated from the catalog, via email, or by creating a scan request for the files, file hashes, URLs, or IP addresses you want to check. The scans will be performed by the appropriate third-party scanner.