Vulnerability Scanner
1. The scan will run on the configured server.
2. Once the scan is complete, the report will be transferred to the controller and saved in the controller's home directory.
3. Users can view the scan results and download the report from the Vulnerability Scanner screen.
Note
1. An internet connection is required on the agent machine for scanning to work.
2. The first scan will take longer as it needs to download and save data from the internet to the local machine. Subsequent scans will be quicker.
3. The duration of the scan depends on the number and size of the files.
4. CPU usage is also dependent on the number and size of the files.
Comments
0 comments
Article is closed for comments.