Automated scan verification

A best practice is to rescan vulnerabilities or vulnerable items after they have been remediated and a vulnerability patch has been applied to the affected records.

Security Operations provides two workflow triggers to automate rescanning of vulnerability groups and vulnerable items.

Rescan vulnerable group
This trigger calls the Vulnerability Response - Scan Vulnerability workflow.
Rescan vulnerable item
This trigger calls the Vulnerability Response - Scan Vulnerable Items workflow.