- Connection
- Scanning
- Security
- Reports & Exports
- Performance
- CISA KEV Catalog
- Maintenance
- Notifications
- Verify the VBR server address and port (default 9419)
- Ensure the Veeam Backup RESTful API Service is running on the VBR server
- Check firewall rules between your desktop and the VBR server on port 9419
- If using HTTPS with a self-signed certificate, enable Accept Self-Signed Certificates in the connection settings
- Verify your credentials and ensure the account has at least Restore Operator permissions
The VBR account must have at least the Restore Operator role to access restore points and publish them via the Data Integration API. An Administrator role also works.
This means the server's SSH fingerprint has changed since you first connected. This can happen if:
- The server was reinstalled
- The SSH host keys were regenerated
- A different server is responding on that address (potential security issue)
To resolve: delete the SSH connection in Settings > SSH and re-add it. You will be prompted to accept the new fingerprint.
Yes. When adding an SSH connection, select SSH Key as the authentication method and provide the private key. Both PEM and OpenSSH key formats are supported.
vScan connects via the VBR REST API using username and password credentials. MFA is not currently supported for the VBR connection. Use a service account with appropriate permissions.
vScan uses the Veeam Data Integration API to publish restore points on the Linux scan server. The API uses FUSE to mount VM disk images in userspace. The required FUSE package is auto-installed by vScan on the Linux server. The entire mount/unmount lifecycle is managed automatically — no manual intervention is needed.
Yes. vScan scans backup restore points, not live VMs. The live VM is never touched or affected.
vScan runs scanners in rootfs mode against the mounted backup disk. Results may differ slightly from running the scanner directly on a live system because:
- The backup may be from a different point in time
- Some runtime-only packages may not be visible on the mounted disk
- Scanner database versions may differ
vScan handles failures gracefully:
- The scan is marked as failed with an error message
- Mounted disks are automatically unmounted (cleanup)
- The VBR restore point session is released
- You can retry the scan from the Scans page
You don't need manual SSH access. From Settings > SSH, you can:
- Install scanners (Trivy, Grype, Jadi) with SHA-256 integrity verification
- Update each scanner's vulnerability database
- Uninstall scanners you no longer need
vScan automatically detects available scanners when connecting to an SSH server.
- Verify the scanner — Go to Settings > SSH and confirm the scanner shows as "installed"
- Choose the right scanner for the disk OS:
- Trivy — Linux (OS packages, application dependencies). Fastest and most comprehensive for Linux systems
- Grype — Linux (similar to Trivy, useful as a second opinion or for comparison)
- Jadi — Windows and .NET (Windows packages, .NET assemblies, MSI). The only scanner for Windows disks
- Scanner database — It may be outdated. Update from Settings > SSH > "Update DB", or run manually on the Linux server:
- Trivy:
trivy image --download-db-only - Grype:
grype db update - Jadi:
jadi update-db
- Trivy:
- Empty disk — The restore point may not contain an operating system (data disk)
Yes. Run separate scans with different scanners on the same VM and restore point. You can then compare results using the Scan Comparison feature.
All credentials (VBR, SSH, SMTP) are stored in a local SQLite database, encrypted with AES-GCM using a master key derived from your master password via Argon2. The database file is located in:
- Windows:
%APPDATA%\vScan-Vulnerability\ - macOS:
~/Library/Application Support/vScan-Vulnerability/
Use your recovery key (VSCAN-XXXX-XXXX-...) to reset your master password. If you have lost both the master password and recovery key, you will need to reset vScan, which deletes all stored credentials (scan history is preserved).
Biometric unlock (Touch ID / Windows Hello) stores a secure token in the OS Keychain. When you use biometric authentication, the OS releases the token, which vScan uses to decrypt the master key. Your master password is never stored in plaintext.
Auto-lock automatically locks the application after a configurable period of inactivity (default: 5 minutes). You can also configure it to lock when the application is minimized. Adjust these settings in Settings > Security.
vScan uses Trust On First Use (TOFU) for VBR TLS certificates. The first time you connect to a VBR server, the certificate's SHA-256 fingerprint is stored. On subsequent connections, vScan verifies the certificate matches. If the certificate changes (e.g., after renewal), you will be prompted to accept the new certificate.
No. vScan is a fully local application. All data stays on your machine. The only network connections are:
- To your VBR server (REST API)
- To your Linux scan server (SSH)
- To SMTP server (if email notifications are configured)
- Scanner database updates are performed on the Linux server, not by vScan
- CSV -- Comma-separated values with all vulnerability details; suitable for spreadsheets and data analysis
- PDF Executive Report -- High-level summary with charts, severity distribution, and top findings
- PDF Technical Report -- Detailed listing of all vulnerabilities with package information and remediation guidance
Yes. Go to Settings > Branding to configure:
- Company name -- Appears in report headers and footers
- Company logo -- Displayed on report cover pages (PNG/JPG, max 2 MB, recommended 300x100 px)
- Go to Vulnerabilities in the sidebar
- Use the filters to select the desired VM, date range, and severity levels
- Click Export CSV or Export PDF (executive or technical)
Scan duration depends on:
- Disk size -- Larger disks take longer to mount and scan
- Number of packages -- More installed packages means more vulnerability checks
- Scanner -- Trivy is typically fastest; Grype and Jadi are comparable
- Network speed -- Between VBR, scan server, and desktop
Typical scan times: 2-10 minutes for a standard server VM.
There is no hard limit. Batch scans support configurable parallelism. The practical limit depends on your Linux scan server's resources (CPU, RAM, disk I/O) and network bandwidth.
The vScan application itself is approximately 100 MB. The SQLite database grows with scan history but typically remains under 500 MB even with thousands of scans. Scanner databases (Trivy/Grype) on the Linux server can be 200-500 MB each.
Yes. You can configure multiple SSH connections in Settings > SSH and choose which server to use for each scan. This is useful for distributing load or scanning across different network segments.
The CISA Known Exploited Vulnerabilities (KEV) catalog is maintained by the U.S. Cybersecurity and Infrastructure Security Agency. It lists CVEs that are confirmed to be actively exploited in the wild. These vulnerabilities are considered highest priority for remediation.
vScan downloads and caches the KEV catalog locally. When displaying scan results, vulnerabilities that match a KEV entry are flagged with a KEV badge. This helps you prioritize remediation of actively exploited vulnerabilities.
You can update the KEV catalog from Settings > Scanner. CISA updates the catalog frequently (often multiple times per week). We recommend updating at least weekly.
Scanner databases can be updated directly from vScan's UI (Settings > SSH > Update DB), or manually on the Linux scan server:
# Update Trivy database
trivy image --download-db-only
# Update Grype database
grype db update
# Update Jadi database
jadi update-dbWe recommend updating databases at least weekly for accurate results.
Back up the SQLite database file:
- Windows:
%APPDATA%\vScan-Vulnerability\vscan.db - macOS:
~/Library/Application Support/vScan-Vulnerability/vscan.db
This file contains all scan history, vulnerability data, and encrypted credentials.
Delete the application data directory:
- Windows:
%APPDATA%\vScan-Vulnerability\ - macOS:
~/Library/Application Support/vScan-Vulnerability/
This removes all data including credentials, scan history, and settings. You will need to set up vScan from scratch.
- Desktop notifications -- Native OS notifications for scan completion, errors, and schedule events
- Email notifications -- SMTP-based emails for the same events
- Go to Settings > Notifications
- Configure SMTP settings:
- SMTP server address and port
- Authentication (username/password)
- TLS/SSL settings
- Sender and recipient email addresses
- Click Send Test Email to verify
- Enable desired notification events (scan complete, scan failed, schedule executed)
Yes. Enter multiple recipient addresses separated by commas in the notification settings.
- Verify SMTP settings are correct (server, port, credentials)
- Click Send Test Email in Settings > Notifications to diagnose
- Check your spam/junk folder
- Ensure the notification events you want are enabled in Notification Preferences
- Verify your SMTP server allows the configured sender address