Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Configure and manage Vulnerability scanners and scans

Log in to subscribe to topics and get notified when content changes.

Configure and manage Vulnerability scanners and scans

Vulnerability scans can be performed to find software vulnerabilities that affect your CIs. You can initiate scans from a vulnerable item record or by creating a scan record directly for configuration items (CIs) and IP addresses.

If you scan vulnerable items directly from the Vulnerable Items screen, you also have the option of scanning multiple vulnerable items at the same time.

If Security Incident Response is activated, you can also initiate a scan from the security incident catalog, a security incident record, or a security scan request.

Scans submitted from vulnerable items, the Security Incident Catalog, security incidents, or security scan requests are performed by the default scanner. For scans submitted directly from a scan record, you can select the scanner to use.