Scans detect and identify network and host vulnerabilities in your environment. You can create scans that may run on a regular basis to help you identify vulnerabilities. For detailed instructions on how to set up a scan, refer to our Define a Scan documentation.
Have more questions? Submit a request