Go to Risk Management > Findings tab > Vulnerabilities tab.
This tab shows the list of vulnerabilities detected in your system. On top of this tab, there are summary cards that show details such as: Exploit validation available.
Click the Exploit Validation Available,as shown in the above image. This filters the data to display only those findings for which TruConfirm feature is available.
Select the findings that you want to include in the scan.
ExpandtheActionsdrop-down list.
The system displays the available actions.
Click Launch TruConfirm Assessment. The system confirms yourselection.
Click Launch.
The system launches the TruConfirm Assessment steps. By default, the system shows Step 1: Basic Information. This page has pre-filled data, such as the option profile and the scanner to be used for scanning.
Verify the details and click Next.
The system shows the Assessment Scope page. This page provides an overview of the scan's scope. You can see the scope of the TruConfirm assessment. You can view the number of assets and unique CVEs.
Click Next.
The system shows the Review & Confirm page. From this page, you can review scan details, including the scope, findings, etc.
Click Launch.
The system launches the TruConfirm assessment scan. The system adds a row for this scan on the TruConfirm tab > Scan tab. One row is added for each scan. The status can be queued, running, etc.