Vulnerability and compliance audit jobs

You can use vulnerability and compliance audit jobs to conduct security audits of monitored devices. You can manually run security audit jobs or configure a schedule to automatically run each job.

When a job is started, the application initiates a scan of devices covered by this job. You can receive the job execution results by email or view and download the relevant data in the application web interface. Based on the job execution results and on the scans, the application can perform the following actions:

The vulnerability and compliance audit jobs must specify the rules used for conducting the audits. Rules can be written in the OVAL language or in the XCCDF language using OVAL definitions.

You can perform device scans as part of a job in one of the following device polling methods:

On devices running Linux operating systems, scans are performed using the commands to run standard diagnostic utilities for Linux devices.

You can manage vulnerability and compliance audit jobs on the Vulnerability and compliance audit tab in the Security audit section. If the Remote connection method is used to scan devices, you can create secrets with the necessary credentials under Settings → Secrets.

After the jobs are started and the device scans are completed, you can get information about the performed scans.

In this section:

Adding a vulnerability and compliance audit job

Editing a vulnerability and compliance audit job

Viewing the table of vulnerability and compliance audit jobs

Manually starting and stopping vulnerability and compliance audit jobs

Viewing general information about the vulnerability and compliance audit job runs

Stopping a device scan in a vulnerability and compliance audit job

Deleting vulnerability and compliance audit jobs

Managing storage settings for the runs of vulnerability and compliance audit jobs

Page top