Views:

View the operating system instances and language packages supported for Agentless Vulnerability & Threat Detection vulnerability and anti-malware scans of your resources in AWS, Google Cloud, Microsoft Azure, and OCI.

Supported Linux operating systems

Agentless Vulnerability & Threat Detection supports instances of the following Linux distribution versions for vulnerability and anti-malware scans.
Distribution
Versions
Amazon Linux
  • Amazon Linux (AMI)
  • Amazon Linux 2
  • Amazon Linux 2023
CentOS
  • CentOS Linux 7
Debian
  • Debian 8
  • Debian 9
  • Debian 10
  • Debian 11
  • Debian 12
Red Hat Enterprise Linux (RHEL)
  • RHEL 6
  • RHEL 7
  • RHEL 8
  • RHEL 9
Ubuntu
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 20.04
  • Ubuntu 22.04
SUSE Linux Enterprise Server
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 15
Oracle Linux Server
  • Oracle Linux Server 6
  • Oracle Linux Server 7
  • Oracle Linux Server 8
  • Oracle Linux Server 9
Rocky Linux
  • Rocky Linux 8
  • Rocky Linux 9

Supported language packages

Note
Note
As of September 2025, Agentless Vulnerability & Threat Detection supports vulnerability scans for language packages, which may cause an increase in detected vulnerabilities.
Agentless Vulnerability & Threat Detection supports the following language-specific packages used in cloud assets.
  • Golang (Go)
  • Java
  • Javascript
  • PHP
  • Python
  • Ruby
  • Rust

Supported Windows operating systems

Agentless Vulnerability & Threat Detection supports instances of the following Windows operating systems for vulnerability and anti-malware scans.
Client operating systems
Server operating systems
  • Windows 10
  • Windows 11
  • Windows Server 2012
  • Windows Server 2010 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
  • Windows Server 2022 version 23H2
  • Windows Server 2025
Important
Important
Agentless Vulnerability & Threat Detection scans files from snapshots of disk volumes rather than calling Windows runtime APIs, so Windows Update records from the snapshot may not be complete. As a result, you might still see vulnerabilities in scan results related to Windows patches you have just applied.