When monitoring risks, the application detects vulnerabilities of devices by using information from the database of known vulnerabilities. Kaspersky experts upload vulnerability information to the database from various data sources.
By default, the application detects vulnerabilities of devices based on the information that has been uploaded to the database from all sources. If necessary, you can select relevant sources to detect vulnerabilities of devices based on the information from only these sources.
Only users with the Administrator role can select sources for device vulnerability detection.
To enable or disable use of sources for vulnerability detection: