Frequently asked questions

By focusing on Security Patch Management, we strive to be the best in the industry and always keep our customer feedback a top priority.

By scanning for missing security and regular patches, organizations can gain the intelligence needed to eliminate the threat posed by insecure and end-of-life software within the corporate environment.

The vulnerability issue cannot be denied. Every organization has the knowledge that vulnerabilities in the IT infrastructure can be used to compromise security. It represents an extra challenge for the teams responsible for IT. 

How can you protect your IT infrastructure more effectively? How can you make sure that computers do not have software installed that lacks the latest security patches? And how can you do this without spending vast amounts of time and effort checking dozens of vendor sites for software updates?

SecTeer VulnDetect is an authenticated internal vulnerability and application scanner, capable of assessing the security status of programs that run on Microsoft Windows, enabling you to fix the vulnerabilities before they are actively exploited.

A vulnerability scanner is a computer program designed to scan for vulnerabilities that are present within your network.

SecTeer was founded in 2017 by its current principals. SecTeer is a privately held, financially stable, and profitable company with a strong track record.

SecTeer VulnDetect is a software solution. An agent is installed locally and has a minimal footprint on the system. The agent installation files are approximately 4MB and use negligible CPU resources and around 4MB of memory when running. At scheduled times, typically once per day, the agent will run a system inspection that temporarily increases the CPU and memory usage. An inspection usually takes only a few seconds.

SecTeer VulnDetect is a proactive solution used in addition to firewalls, IDS and other network security systems. It will help you secure and monitor your network against new threats that are otherwise not monitored.

SecTeer VulnDetect utilizes agent-based scans with minimal resource usage.

The file signatures and software packages used by SecTeer VulnDetect are maintained and updated daily.

Yes. Our internal advisory for the signatures within VulnDetect always includes a link to the CVE reference.

SecTeer VulnDetect is used across multiple segments, enterprise, small to medium businesses, consultants and managed service providers. Regardless of the environment, the scalable, secure end-to-end solution is unchanged.

Within your “Hosts” overview you can “move selected hosts to trash” which can be then viewed under “configuration” either to restore or delete the hosts entirely.

A scan consists of 2 parts; the first part is third-party applications that SecTeer VulnDetect scans for, the second part is matching to the correct updates. Also, you may want to check if the hosts are added to an “approval group”.

A download link is always included to verify the validity of the update.

Only hosts that are in groups are patched. Once a host is in a group, approvals will be automatically created for any discovered software that can be patched.

Approve the recommended version of the software that an approval applies to and all the hosts in that group that have that software installed will be updated automatically.

You can refer to the VulnDetect Setup guide or contact our support personnel for assistance.


A weekly report is sent to you, which provides a Dashboard overview with the following information:

Summary of the number of applications which are/have:

# Out-of-Date Approvals

# Groups

# Hosts

# Products

# Versions

# Installations

# 0-Day

# Insecure

# End-of-Life

# Ok

SecTeer VulnDetect  can generate PDF reports; however, it is possible to extract custom made reports from SecTeer VulnDetect. Use Export to export the data into the Clipboard or into a .CSV file.

Technical - General

Using SecTeer VulnDetect, you have access to 2 different scan approaches:

  • On-Demand Scanning
    From the VulnDetect GUI, you can easily create scan groups manually. The groups can then scan immediately.
  • VulnDetect Agent – Single Mode
    The SecTeer VulnDetect Agent is a standalone executable file that can run as a local service. The agent can be configured to scan the system at regular intervals available under “configuration”.

Yes. SecTeer VulnDetect is designed to deploy standard and security patches that were found missing from the scan results. This integration of SecTeer VulnDetect allows network administrators to easily handle the entire vulnerability management life cycle.

No. SecTeer VulnDetect does not scan removable or network drives such as USB sticks or other types of removable drives.

The number of systems that can be scanned by SecTeer VulnDetect is dependent on the license that you have purchased from SecTeer. If you reach your license limit, deleting old systems from SecTeer VulnDetect will release the corresponding number of licenses. If you need additional licenses, please contact your SecTeer Sales Representative.

Although the login of concurrent sessions is possible, SecTeer VulnDetect is designed to allow only one session per account. If you wish to have several SecTeer VulnDetect accounts, please ask your SecTeer Sales Representative about an additional Admin license.

The SecTeer VulnDetect Agent can be downloaded from your Dashboard under “configuration”.

Please contact the SecTeer Customer Support Center;

You can also reset your password by clicking on the link below:

SecTeer VulnDetect is capable of scanning any Windows system, virtual machine and terminal server.

Supported Microsoft Operating Systems are.

  • Windows 10
  • Windows 8
  • Windows 7 SP2 or later
  • Windows Vista
  • Windows 7
  • Windows Server 2003
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2016
  • Windows Server 2019

Supported Browsers, the latest version for viewing results:

  • Google Chrome
  • Mozilla Firefox
  • Microsoft Edge
  • 10 MB of free disk space

Running the centralized dashboard

  • Network/Internet connection (SSL 443/tcp to
  • 10 MB of free disk space

Agent-based scanning

  • Network/Internet connection (SSL 443/tcp to
  • Local administrative privileges for Agent deployment to Network
  • 10 MB of free disk space

The addresses to Amazon trust services:

and SecTeer:


whitelist and

Please ensure that the above addresses are whitelisted in your Firewall and or Proxy configuration.

By using the Suggest Software feature available in SecTeer VulnDetect, you can quickly request SecTeer to start monitoring the missing software. Requests from our customers are highly appreciated and will be promptly addressed.

Yes, you can request this through your account or by sending the request to support@secteer.comWe will then assess your request and if applicable, add the package and support the software in the future.

Yes. All the communication between the SecTeer VulnDetect Agent or the SecTeer VulnDetect Graphical User Interface and SecTeer is made through port 443, and by using SSL protocol with 256-bit encryption.

No. Due to its lightweight design, SecTeer VulnDetect is able to run in the most common Windows systems. For more detailed information, please refer to the system requirements for running the SecTeer VulnDetect Centralised Dashboard.

You can send your question directly to, and a solution specialist will be assigned to you and assist with your query.

The agent downloads the packages and installers via https / port 443 and as a Local System. Depending on the configuration of the filter, it could potentially block it and you must test it by approving one or more updates.

If the updates are unsuccessful SecTeer support will  troubleshoot the problem and attempt to provide a solution.

The most likely explanation is that an antivirus program uploaded the secteerSetup.msi file and a researcher at that antivirus company installed the program. You can safely delete the agent in the interface. It’s important to note that the MSI file you have received is keyed to your account, so anyone who receives it can run it, and the resulting agent will also be keyed to your account. There is no security issue here because the agent doesn’t receive any significant information from the server.

The packages from VulnDetect are compiled and tested in Denmark, which is part of the EU.

We create a package which downloads the installer directly from the vendor (or in a few cases our archive). All downloads are checked using a sha256 checksum which we embed in the package.

We always verify the digital signature.

To the extent possible, the sha256 sum which we embed in the package is calculated based on installers downloaded via https from official sources, and we verify the Authenticode signature of the installer when available. In rare cases where one or both https and Authenticode isn’t possible, the file will be vetted using other mechanisms such as VirusTotal, GPG, or other hash/checksum sources.

Our agent downloads the package (PowerShell script) from our server via HTTPS and verifies that the retrieval was conducted through our server.

Scroll to Top

We use cookies to give the user the best experience possible. By using our site you accept the use of cookies.