![8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal 8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal](https://access.redhat.com/webassets/avalon/d/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US/images/810765c6844325a87e4a764c9c7e4ce4/scap-workbench-results.png)
8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal
![8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal 8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal](https://access.redhat.com/webassets/avalon/d/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US/images/2670e32c2e2ea6fec1945ffd4e81889d/scap-workbench-start.png)
8.7. Scanning the System with a Customized Profile Using SCAP Workbench Red Hat Enterprise Linux 7 | Red Hat Customer Portal
![Chapter 9. Scanning the system for configuration compliance and vulnerabilities Red Hat Enterprise Linux 8 | Red Hat Customer Portal Chapter 9. Scanning the system for configuration compliance and vulnerabilities Red Hat Enterprise Linux 8 | Red Hat Customer Portal](https://access.redhat.com/webassets/avalon/d/Red_Hat_Enterprise_Linux-8-Security_hardening-en-US/images/4de750027ee8c65e419e8dc0a023721f/scap-workbench-customizing-profile.png)