Configuring Vulnerability Scan settings
To configure Vulnerability Scan settings, you can perform the following actions:
- Create the Vulnerability Scan scope.
You can expand or narrow the scan scope by adding or removing applications to be scanned for vulnerabilities.
- Select the run mode for the Vulnerability Scan task.
If it is impossible to run the task for whatever reason (for example, the computer is off at the time), you can configure the skipped task to run automatically as soon as this becomes possible.
- Configure the task to run under the rights of a different user account.
By default, a scan task is run with the permissions of the account under which the user logged in to the operating system. However, you may need to run a scan task under a different user account. You can specify a user who has the appropriate rights in the settings of the task and run the task under this user's account.