TOC & Recently Viewed

Recently Viewed Topics

View Container Details

A container is a running instance of an image. You create containers from an image each time you run the image on your application. You can create multiple containers from a single image, and you can make changes to those containers without affecting the image from which you created them.

When you perform a scan on your system using Nessus or Nessus Agent, Container Security identifies the images and containers in the system and analyzes the containers for risk. Container Security then displays the containers by scan status and risk level in the Identified Containers widget on the Container Security dashboard based on the results of the most recent scan.

Note: Container Security imports and rescans your images at eight-hour intervals, beginning when you first import and scan the images.

Before you begin:

To view container details in the Identified Containers widget:

Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.

  1. In the Container Security dashboard, on the Identified Containers widget, view your containers, categorized by risk.

    Note: Container Security determines a container's overall risk score by rounding the CVSSv2 risk score of the vulnerability on the container with the highest risk score. For more information about container risk metrics, see Container Risk.

  2. Click the Identified Containers widget.
    The Identified Containers page appears. The Identified Containers table lists all the containers created from images scanned by Container Security.
  3. In the Identified Containers table, you can:

    • Filter the Identified Containers table.
    • Search the Identified Containers table.
    • View details about your identified containers in the Identified Containers table.

      Column Description

      The container ID.

      REPOSITORY/IMAGE:TAG The repository name, image name, and image tag (e.g., latest).

      The risk score on a scale of 1-10.


      Indicates whether the container is associated to an unscanned image.

      • check mark Container Security has scanned the image.
      • warning Container Security has never scanned the image.

        Note: When you initiate an image import, Container Security immediately queues the image to be scanned. However, there are sometimes delays between when you start the scan and when Container Security completes the scan. To confirm there are no undetected vulnerabilities, Tenable recommends that you import and scan any images marked as not scanned. For information about how to import and scan images, see Get Started with Container Security.

      • Indicates whether the files on the container changed, were added, or were deleted during the scan.

        Note: If file changes are detected, check your images and repositories and confirm that no one has accessed them without authorization.

        • check mark No files changes occurred during the scan.
        • warning File changes occurred during the scan.


      The number of vulnerabilities detected in the container.


      The number of malware items detected in the container.

      HOST IP

      The IP address for the container's location.

    •  View details for a specific container.
      1. In the Identified Containers table, click the row for the container you want to view.
        The identified containers details page appears.
      2. On the identified containers details page, you can:

        • View details for each vulnerability identified in the image your identified container links to:
          • View the SEVERITY rating.

            Note: Container Security uses a severity metric based on a vulnerability's CVSSv2 score to determine the vulnerability's risk category. For information about image risk metrics, see Image Risk.

          • View the VULNERABILITY ID.
          • View the RISK SCORE.
          • View the RELEASE DATE for the vulnerability.
        • Click a row in the vulnerabilities table.

          The vulnerability details plane appears, containing details and remediation recommendations for the vulnerability.

        • View details about malware detected in the identified container:
          • View the INFECTED FILE column for the names of each infected file.
          • View the RISK SCORE for each infected file.
        • View details about the image your container links to.
          • View the IMAGE ID.
          • View the local REPOSITORY where the image resides.
          • View the IMAGE NAME.
          • View the TAG column for the tag associated with the image (e.g., latest).
        • Click a row in the image table.

          The details page appears for the image your identified container links to. For information about the image details, see View Scan Results for Container Images.

        Package Inventory
        • View the PACKAGE NAME for each package in the image your identified container links to.
        • View the PACKAGE VERSION for each package in the image your identified container links to.
        • View the LICENSE for each package in the image your identified container links to.
        • View the PACKAGE TYPE for each package in the image your identified container links to.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.