Instead, we recommend that you prioritize certain detectors based on your organization’s definition of critical violations and limit the scan to a specific date range (e.g. one month at a time). Then, run subsequent scans to cover the remaining date ranges and remaining detectors, excluding content that you’ve already scanned.