Contents Security Operations Previous Topic Next Topic Scan a new or existing vulnerable item Subscribe Log in to subscribe to topics and get notified when content changes. ... SAVE AS PDF Selected Topic Topic & Subtopics All Topics in Contents Share Scan a new or existing vulnerable item You can scan a new or existing vulnerable item that contains at least one affected CI or has an IP address populated on the form. Before you beginThe vulnerable item that you want to scan must contain an affected CI or IP address.Role required: sn_vul.vulnerability_write Procedure Navigate to Vulnerability > Vulnerabilities > Vulnerable Items. Create a new vulnerable item or open an existing one. Click the Scan for Vulnerabilities related link. A message appears with a link to the scan and the work notes are updated. Click the link to see the progress or results of the scan. Note: It is a good practice is to rescan vulnerabilities or vulnerable items after they have been remediated and a vulnerability patch has been applied to the affected records. The rescan can be performed using the preceding procedure, but you can also automate the rescans. Related TasksScan CIs and IP addressesScan multiple vulnerabilities or vulnerable itemsView the vulnerability scan queueRelated ConceptsThird-party vulnerability scanners On this page Send Feedback Previous Topic Next Topic
Scan a new or existing vulnerable item You can scan a new or existing vulnerable item that contains at least one affected CI or has an IP address populated on the form. Before you beginThe vulnerable item that you want to scan must contain an affected CI or IP address.Role required: sn_vul.vulnerability_write Procedure Navigate to Vulnerability > Vulnerabilities > Vulnerable Items. Create a new vulnerable item or open an existing one. Click the Scan for Vulnerabilities related link. A message appears with a link to the scan and the work notes are updated. Click the link to see the progress or results of the scan. Note: It is a good practice is to rescan vulnerabilities or vulnerable items after they have been remediated and a vulnerability patch has been applied to the affected records. The rescan can be performed using the preceding procedure, but you can also automate the rescans. Related TasksScan CIs and IP addressesScan multiple vulnerabilities or vulnerable itemsView the vulnerability scan queueRelated ConceptsThird-party vulnerability scanners
Scan a new or existing vulnerable item You can scan a new or existing vulnerable item that contains at least one affected CI or has an IP address populated on the form. Before you beginThe vulnerable item that you want to scan must contain an affected CI or IP address.Role required: sn_vul.vulnerability_write Procedure Navigate to Vulnerability > Vulnerabilities > Vulnerable Items. Create a new vulnerable item or open an existing one. Click the Scan for Vulnerabilities related link. A message appears with a link to the scan and the work notes are updated. Click the link to see the progress or results of the scan. Note: It is a good practice is to rescan vulnerabilities or vulnerable items after they have been remediated and a vulnerability patch has been applied to the affected records. The rescan can be performed using the preceding procedure, but you can also automate the rescans. Related TasksScan CIs and IP addressesScan multiple vulnerabilities or vulnerable itemsView the vulnerability scan queueRelated ConceptsThird-party vulnerability scanners