To use the Threat Scan platform, you first need to onboard your supported resources and link them to a Threat Scan plan. This plan lets you define the scan schedule, select the types of threats to monitor, and configure storage and compute settings.
×