Controlling Using Protocols
You can scan using a variety of pathways and protocols. Also, you can use network scanning from an unspecified number of network computers.
You can lower unintended security risks by restricting scanning from specific pathways or by controlling the available functions.