Configure the Application

Once you install the Qualys Container Vulnerability Response Integration, you must configure it.

Configuration Steps

The following are the steps to configure Qualys Container Response Vulnerability Integration:

  1. Configure Qualys Credentials.
  2. Qualys Container Vulnerability Integrations.