The number of objects with vulnerabilities, malware, sensitive data, and misconfigurations in the image, indicating the number of objects for each identified risk severity level.
Applied security policies with an indication of the identified security issues (vulnerabilities, malware, confidential information, misconfigurations, resource packages allowed by the OS) within the active scopes.
If the policy is applied, the scope specified in the policy includes the scanned image.
Recommended actions to secure the image are listed in the lower part of the page.
By clicking the Create report button, you can generate a detailed report on images. You can also initiate a rescanning of the image by clicking the Rescan button.