Before using Cloud Guard, at least one Vulnerability Scanning target must exist before the Vulnerability Scanning service creates any reports. These reports are used by the Cloud Guard detector. See Managing Targets.
Note
Cloud Guard targets are separate resources from Vulnerability Scanning targets. To use Cloud Guard to detect problems in Vulnerability Scanning reports, the Vulnerability Scanning target compartment must be the same as the Cloud Guard target compartment, or be a subcompartment of the Cloud Guard target compartment.
To view Vulnerability Scanning problems in Cloud Guard:
If you created a custom configuration detector recipe in Cloud Guard, verify that the Vulnerability Scanning detector rules are enabled in your
recipe.
All detector rules are automatically enabled in Oracle-managed recipes such as OCI Configuration Detector Recipe, and can't be disabled.
From the Cloud Guard console, click
Detector Recipes.
Click your custom configuration detector recipe.
Under Detector Rules, in the Filter
by detector rule field, enter
scan.
Select the check boxes for the Vulnerability Scanning
rules.
Scanned container image has vulnerabilities
Scanned host has vulnerabilities
Scanned host has open ports
If these rules aren’t already enabled, click Enable.