Scans

You can perform threat and vulnerability scans from security incidents and from the security incident catalog.