Vulnerability assessment for Linux machines

You can scan Linux machines for application-level and kernel-level vulnerabilities.

To configure the vulnerability assessment for Linux machines

  1. In the Cyber Protect console, create a protection plan and enable the Vulnerability assessment module.
  2. Specify the vulnerability assessment settings:

    • What to scan – select Scan Linux packages.
    • Schedule – define the schedule for performing the vulnerability assessment.

    For more information about the Schedule options, see Vulnerability assessment settings.

  3. Assign the plan to the Linux machines.

After a vulnerability assessment scan, you can see a list of found vulnerabilities. You can process the information and decide which of the found vulnerabilities must be fixed.

To monitor the results of the vulnerability assessment, see the Monitoring > Overview > Vulnerabilities / Existing vulnerabilities widgets.