To configure Vulnerability Scan settings, you can perform the following actions:
You can expand or narrow the scan scope by adding or removing applications to be scanned for vulnerabilities.
If it is impossible to run the task for whatever reason (for example, the computer is off at the time), you can configure the skipped task to run automatically as soon as this becomes possible.
By default, a scan task is run with the permissions of the account under which the user logged in to the operating system. However, you may need to run a scan task under a different user account. You can specify a user who has the appropriate rights in the settings of the task and run the task under this user's account.