Manage Vulnerability scanners and scans

Vulnerability scans can be performed to find software vulnerabilities that affect your CIs. You can initiate scans from a vulnerable item record or by creating a scan record directly for CIs and IP addresses.

If you scan vulnerable items directly from the Vulnerable Items screen, you also have the option of scanning multiple vulnerable items at the same time.

If Security Incident Response is activated, you can also initiate a scan from the security incident catalog, a security incident record, or a security scan request.

Scans submitted from vulnerable items, the Security Incident Catalog, security incidents, or security scan requests are performed by the default scanner. For scans submitted directly from a scan record, you can select the scanner to use.