<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>General Product Questions Archives - Network Scanning | NetPropriate</title>
	<atom:link href="https://netpropriate.com/faq_category/general-product-questions/feed/" rel="self" type="application/rss+xml" />
	<link>https://netpropriate.com/faq_category/general-product-questions/</link>
	<description>Helps Protect your people, your money, and your reputation</description>
	<lastBuildDate>Mon, 11 Nov 2024 18:50:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>How often should I run scans with NetPropriate?</title>
		<link>https://netpropriate.com/data-forensics/faq-items/how-often-should-i-run-scans-with-netpropriate/</link>
					<comments>https://netpropriate.com/data-forensics/faq-items/how-often-should-i-run-scans-with-netpropriate/#respond</comments>
		
		<dc:creator><![CDATA[Michael Cybulski]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 18:12:10 +0000</pubDate>
				<guid isPermaLink="false">https://netpropriate.com/?post_type=avada_faq&#038;p=3655</guid>

					<description><![CDATA[<p>Scans can be customized based on your needs. Some clien  [...]</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/how-often-should-i-run-scans-with-netpropriate/">How often should I run scans with NetPropriate?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Scans can be customized based on your needs. Some clients prefer an initial baseline scan followed by periodic scans, while others run continuous scans to maintain deterrence and uphold safety standards.</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/how-often-should-i-run-scans-with-netpropriate/">How often should I run scans with NetPropriate?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://netpropriate.com/data-forensics/faq-items/how-often-should-i-run-scans-with-netpropriate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How does NetPropriate differ from standard security tools like firewalls and web filters?</title>
		<link>https://netpropriate.com/data-forensics/faq-items/how-does-netpropriate-differ-from-standard-security-tools-like-firewalls-and-web-filters/</link>
					<comments>https://netpropriate.com/data-forensics/faq-items/how-does-netpropriate-differ-from-standard-security-tools-like-firewalls-and-web-filters/#respond</comments>
		
		<dc:creator><![CDATA[Michael Cybulski]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 18:11:41 +0000</pubDate>
				<guid isPermaLink="false">https://netpropriate.com/?post_type=avada_faq&#038;p=3654</guid>

					<description><![CDATA[<p>While firewalls and web filters focus on blocking harmf  [...]</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/how-does-netpropriate-differ-from-standard-security-tools-like-firewalls-and-web-filters/">How does NetPropriate differ from standard security tools like firewalls and web filters?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While firewalls and web filters focus on blocking harmful websites and internet content, NetPropriate goes deeper, scanning files on local devices and networks. This approach addresses risks that can bypass firewalls, such as content from external hard drives, VPNs, and off-site browsing.</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/how-does-netpropriate-differ-from-standard-security-tools-like-firewalls-and-web-filters/">How does NetPropriate differ from standard security tools like firewalls and web filters?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://netpropriate.com/data-forensics/faq-items/how-does-netpropriate-differ-from-standard-security-tools-like-firewalls-and-web-filters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What types of inappropriate content does NetPropriate identify?</title>
		<link>https://netpropriate.com/data-forensics/faq-items/what-types-of-inappropriate-content-does-netpropriate-identify/</link>
					<comments>https://netpropriate.com/data-forensics/faq-items/what-types-of-inappropriate-content-does-netpropriate-identify/#respond</comments>
		
		<dc:creator><![CDATA[Michael Cybulski]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 18:11:13 +0000</pubDate>
				<guid isPermaLink="false">https://netpropriate.com/?post_type=avada_faq&#038;p=3653</guid>

					<description><![CDATA[<p>Our system is designed to detect content related to chi  [...]</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/what-types-of-inappropriate-content-does-netpropriate-identify/">What types of inappropriate content does NetPropriate identify?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our system is designed to detect content related to child exploitation, harassment, and other categories that violate safe workplace and educational standards. We continuously update our database to ensure comprehensive and accurate scanning.</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/what-types-of-inappropriate-content-does-netpropriate-identify/">What types of inappropriate content does NetPropriate identify?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://netpropriate.com/data-forensics/faq-items/what-types-of-inappropriate-content-does-netpropriate-identify/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What does NetPropriate do, and how does it work?</title>
		<link>https://netpropriate.com/data-forensics/faq-items/what-does-netpropriate-do-and-how-does-it-work/</link>
					<comments>https://netpropriate.com/data-forensics/faq-items/what-does-netpropriate-do-and-how-does-it-work/#respond</comments>
		
		<dc:creator><![CDATA[Michael Cybulski]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 18:09:52 +0000</pubDate>
				<guid isPermaLink="false">https://netpropriate.com/?post_type=avada_faq&#038;p=3652</guid>

					<description><![CDATA[<p>NetPropriate is a network monitoring tool that scans t  [...]</p>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/what-does-netpropriate-do-and-how-does-it-work/">What does NetPropriate do, and how does it work?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1248px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1 fusion-text-no-margin" style="--awb-margin-top:0px;--awb-margin-bottom:0px;"><p>NetPropriate is a network monitoring tool that scans the metadata (md5 hashes) of files on your network without accessing file content. By cross-referencing hashes against our extensive database of over 150 million known inappropriate files, it can detect inappropriate content with zero false positives.</p>
</div></div></div></div></div>
<p>The post <a href="https://netpropriate.com/data-forensics/faq-items/what-does-netpropriate-do-and-how-does-it-work/">What does NetPropriate do, and how does it work?</a> appeared first on <a href="https://netpropriate.com">Network Scanning | NetPropriate</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://netpropriate.com/data-forensics/faq-items/what-does-netpropriate-do-and-how-does-it-work/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
