Vulnerability assessment for Linux machines
You can scan Linux machines for application-level and kernel-level vulnerabilities.
To configure the vulnerability assessment for Linux machines
- In the Cyber Protect console, create a protection plan and enable the Vulnerability assessment module.
-
Specify the vulnerability assessment settings:
- What to scan – select Scan Linux packages.
-
Schedule – define the schedule for performing the vulnerability assessment.
For more information about the Schedule options, see Vulnerability assessment settings.
- Assign the plan to the Linux machines.
After a vulnerability assessment scan, you can see a list of found vulnerabilities. You can process the information and decide which of the found vulnerabilities must be fixed.
To monitor the results of the vulnerability assessment, see the Monitoring > Overview > Vulnerabilities / Existing vulnerabilities widgets.