{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/c7bd417e87f94dd7bb5acbbf544030ab\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/c7bd417e87f94dd7bb5acbbf544030ab-c1d8f76e9c46a47c.gif","duration":387.576,"title":"Video - How to Use Software and CVE Detection","description":"In this video, I walk you through the process of software detection in FADM, which allows for quick and agentless identification of installed software on virtual machines. I cover the setup of a Windows proxy, creating tasks for software and CVE discovery, and how to manage credentials effectively. I also demonstrate how to view the results and set policies for software management. Please ensure to follow the steps outlined and reach out to FADM support if you encounter any issues."}