Configure the Application

Once you install the Qualys Container Vulnerability Response Integration, you must configure it.

Configuration Steps

The following are the steps to configure Qualys Container Response Vulnerability Integration:

  1. Configure Qualys Credentials
  2. Qualys Container Vulnerability Integrations

Related Topic

Qualys Container Vulnerability Response Integrations