With scans, you can identify and assess security vulnerabilities on your network.

Use the API to interact with scans in You can list scan results, create scans, update scans, delete scans, copy scan configurations, configure scan schedules, launch scans, interact with running scan processes, and import and export scan data.

For background information about scans, see Vulnerability Management User Guide.