Vulnerability Scanning allows for multiple targets within an account to be scanned. There are two types of scanning, Network Vulnerability Scanning and Web Application Scanning.
Login to your account and click on your avatar in the top right and select Scanning & Compliance from the dropdown.
Your dashboard will show vulnerabilities by severity in a clickable graph and a table for the most vulnerable targets should you have multiple targets or IP's being scanned. It will also show your PCI compliance summary and additional at-a-glance information.
Using the left hand navigation, you'll find links to the key sections.
Use the targets screen to add additional targets or configure the target.
Configuring a Target
By clicking a target and selecting Settings, you can change multiple settings on a target such as a scan frequency, timing of scans, tags for grouping targets with others, and types of scans (Vulnerability and or Web Application).
Vulnerabilities provides a navigational path to see each vulnerability. You can filter your view by targets, vulnerability categories, and severity.
Vulnerability view provides an overview of the vulnerability, potential recommendation for remediation and the location of the vulnerability along with the code snippet.
Use open ports to discover any ports that are being used or open on a target.
The discovery feature will help you learn about new targets added around your URLs or IP ranges.
This is the overview page for your PCI compliance scans.
On this page, you can generate your PCI compliance reports, see the differences between scans. Compare multiple scans to track progress on remediation and discover new threats.