Vulnerability scanners and scans Vulnerability scans can be performed to find software vulnerabilities that affect your CIs. You can initiate scans from a vulnerable item record or by creating a scan record directly for CIs and IP addresses. If you scan vulnerable items directly from the Vulnerable Items screen, you also have the option of scanning multiple vulnerable items at the same time. If Security Incident Response is activated, you can also initiate a scan from the security incident catalog, a security incident record, or a security scan request. Scans submitted from vulnerable items, the Security Incident Catalog, security incidents, or security scan requests are performed by the default scanner. For scans submitted directly from a scan record, you can select the scanner to use. Add a third-party vulnerability scannerYou can integrate Vulnerability Response with third-party vulnerability scanners to scan and identify potential vulnerabilities. Scan CIs and IP addressesIf you suspect that your CIs or IP addresses contain vulnerable software, you can create a request to scan them. Also, if you question whether a vulnerability has been resolved, you can create a request to have a CI or IP addresses rescanned.Scan a new or existing vulnerable itemYou can scan a new or existing vulnerable item that contains at least one affected CI or has an IP address populated on the form.Scan multiple vulnerabilities or vulnerable itemsYou can simultaneously scan multiple vulnerabilities or vulnerable items that contain at least one affected CI or an IP address populated on the form.Automated scan verificationYou can rescan vulnerabilities or vulnerable items after they have been remediated and a vulnerability patch has been applied to the affected records. View the vulnerability scan queueVulnerability scan requests submitted to a third-party vulnerability scanning integration are queued so as not to overload system resources. You can view the status of queued requests, as needed.