Vulnerability scanners and scans Vulnerability scans can be performed to find software vulnerabilities that affect your CIs. You can initiate scans from a vulnerable item record or by creating a scan record directly for CIs and IP addresses. If Security Incident Response is activated, you can also initiate a scan from the security incident catalog, a security incident record, or a security scan request. Scans submitted from vulnerable items, the security incident catalog, security incidents, or security scan requests are performed by the default scanner. For other scan requests, you can select the scanner to use. Add a third-party vulnerability scannerYou can integrate Vulnerability Response with third-party vulnerability scanners to scan and identify potential vulnerabilities. Submit a vulnerability scan request for CIs and IP addressesIf you suspect that your CIs or IP addresses contain vulnerable software, you can create a request to scan them. Additionally, if you believe that a vulnerability has been resolved, you can create a request to have a CI or IP addresses rescanned.Submit a vulnerability scan from a vulnerable itemYou can scan vulnerable items that contain at least one affected CI or has an IP address populated on the form.