Reference Guide
...
Reports
Audit Report

Vulnerability Scanner Report

The Vulnerability Scanner Report helps monitor security vulnerabilities in database systems by tracking known CVEs (Common Vulnerabilities and Exposures) in databases like PostgreSQL, Oracle, MSSQL, and others.

  1. Navigate to Vulnerability Scanner.
  2. Open the Report Configuration tab.
  3. Fill out the necessary fields to create a report configuration. The report job can be executed manually or scheduled to run periodically.
Vulnerability Scanner Report Configuration
Vulnerability Scanner Report Configuration


To execute the report manually, click the Options pop-up menu button and select Run.

Vulnerability Scanner Report Configuration Options / Run Button
Vulnerability Scanner Report Configuration Options / Run Button


Once the job is complete, the reports are listed under the Reports tab. To view the reports:

  1. Navigate to Vulnerability Reports.
  2. Open the Reports tab.
  3. Click the Options drop-down menu button and select Show Details.
 Vulnerability Scanner Report
Vulnerability Scanner Report

Vulnerability Scanner Report Details
Vulnerability Scanner Report Details


This report helps database administrators monitor CVEs and suggests updates to mitigate identified vulnerabilities, enhancing the security of the database systems.

By maintaining updated vulnerability management, organizations can minimize security breaches and ensure the integrity of their data.

Vulnerability Scanner Scheduled Reporting: Scheduled reports in the Vulnerability Scanner allow for regular, automated scanning based on predefined schedules. This ensures ongoing surveillance of CVEs within registered database systems, facilitating timely responses to potential vulnerabilities.

  1. Navigate to Vulnerability Reports.
  2. Open the Report Configuration tab.
  3. Click on Add Scheduled Configuration.
  4. Fill out the necessary fields to define the scan settings and schedule.
Vulnerability Scanner Report Details
Vulnerability Scanner Report Details


The Job Scheduler is used to manage and trigger scheduled tasks automatically based on defined conditions, which can include specific times or events.

  1. Go to Administration > Job Scheduler.
  2. In the Trigger List sub-page, click Add Trigger.
  3. Select VulnerabilityScannerJob.
  4. Add a Cron Expression for the job to run at a recurrence unit of 1 hour.
  5. Ensure the Active button is toggled to enable the job.

To ensure scheduled jobs function correctly, manually trigger and set cron expressions in the Job Scheduler. Access this via Administration > Job Scheduler where you can activate the VulnerabilityScannerJob. Confirm execution by checking immediate feedback for manual triggers and validate cron expressions by observing scheduled runs.

Job Scheduler Trigger Setup
Job Scheduler Trigger Setup

Defined Trigger in Job Scheduler
Defined Trigger in Job Scheduler

Manual Trigger in Actions
Manual Trigger in Actions