top of page

Summary:

​

  1. Create a vulnerability profile

  2. Attach it to a security policy  

​

Note, if you want to check all signatures, you can check "Show all signatures" button

bottom of page