Note
After you create an OCI agent or Qualys agent Compute scan recipe, don't change that recipe to change agents. Create another recipe.
-
Open the navigation menu and click Identity &
Security. Under Scanning, click
Scan Recipes.
-
Select the compartment that contains the recipe.
-
Click the Hosts tab if not already selected.
-
Click the name of the recipe.
-
Click Edit.
-
Change any of the following settings for the recipe.
- Name
Avoid entering confidential information.
- Public IP port scanning
- Agent based scanning
- CIS benchmark scanning (for OCI agents)
- CIS benchmark profile (for OCI agents)
- Enable file scans (for OCI agents)
- Linux folders to scan (for OCI agents)
Separate multiple folders by using semicolons.
- Windows folders to scan (for OCI agents)
Note
Reserved for future use by Oracle. File scans aren't available for the Windows operating system.
- Vault (for Qualys agents)
- Secret (for Qualys agents)
- File scan schedule
- Schedule
The Vulnerability Scanning agent checks the OS configuration of targets for vulnerabilities, such as missing patches. The agent can also check targets for the following information:
- Compliance with industry-standard benchmarks published by the Center for Internet Security (CIS)
- Vulnerabilities in third-party applications within specific folders
The schedule controls how often the targets assigned to this recipe are scanned.
-
Click Save changes.
- (Optional)
Click the Tags tab to manage the tags for this recipe.
If you have permissions to create a resource, you also have permissions to add
free-form tags to that resource.
To add a defined tag, you must have permissions to use the tag namespace.
For more information about tagging, see Resource Tags. If you're not sure if you should add tags, skip this option or ask your administrator. You can add tags later.