Restrictions related to scopes

The access to the list of detected vulnerabilities is given by scopes assigned to the user as follows.

Page top