Reference Guide
Reports
Vulnerability Scanner Report
4 min
the vulnerability scanner report helps monitor security vulnerabilities in database systems by tracking known cves (common vulnerabilities and exposures) in databases like postgresql, oracle, mssql, and others navigate to vulnerability scanner open the report configuration tab fill out the necessary fields to create a report configuration the report job can be executed manually or can be scheduled to run periodically to execute the report manually, click the options pop up menu button and select run vulnerability scanner scheduled reporting scheduled reports in the vulnerability scanner allow for regular, automated scanning based on predefined schedules this ensures ongoing surveillance of cves within registered database systems, facilitating timely responses to potential vulnerabilities navigate to vulnerability reports open the report configuration tab click on add scheduled configuration fill out the necessary fields to define the scan settings and schedule the job scheduler is used to manage, and trigger scheduled tasks automatically based on defined conditions, which can include specific times or events go to administration > job scheduler in the trigger list sub page, click add trigger select vulnerabilityscannerjob add a cron expression for the job to run at a recurrence unit of 1 hour ensure the active button is toggled to enable the job to ensure scheduled jobs function correctly, manually trigger and set cron expressions in the job scheduler access this via administration > job scheduler , where you can activate the vulnerabilityscannerjob confirm execution by checking immediate feedback for manual triggers and validate cron expressions by observing scheduled runs