field, enter the FQDN of your Harbor registry (https://).
In
Repository name
, enter the name of the repository to scan, or leave this blank to scan all repositories.
In
Credential
, select the credentials to use.
If Console doesn’t have a copy of your credentials yet, click
Add New
.
Select either
Basic authentication
, and fill out the rest of the fields.
The minimum required credentials for each repository is
Limited Guest
.
In
OS type
, specify whether the repo holds
Linux
or
Windows
images.
In
Scanner
, select
Automatic
.
Console automatically selects an available Defender to execute the scan job.
Alternatively, you can explicitly select a Defender from the drop-down list.
Defenders are listed according to the hosts where they run.
For more information, see deployment patterns.
In
Number of scanners
, enter the number of Defenders across which scan jobs can be distributed.
Set
Cap
to the number of most recent images to scan.
Leaving
Cap
set to the default value of
5
will scan the most recent 5 images.
Setting this field to
0
will scan all images.
Click
Add
.
Click the yellow save button.
Verify that the images in the repository are being scanned.
Go to
Monitor > Vulnerabilities > Images > Registries
.
A progress indicator at the top right of the window shows the status of the current scan.
As the scan of each image is completed, its findings are added to the results table.
To get details about the vulnerabilities in an image, click on it.
To force a specific repository to be scanned again, select
Scan
from the top right of the results table, then click on the specific registry to rescan.