Usually SCA policies have some requirements and if they are not met, scans will be skipped.
In an agent's SCA directory /var/ossec/ruleset/sca/cis... you will need to access, if for example you want to include AlmaLinux 8, you can add the following line in the requirements section:
policy:
id: "cis_ubuntu20-04"
file: "cis_ubuntu20-04.yml"
name: "CIS Ubuntu Linux 20.04 LTS Benchmark v1.1.0"
description: "This document provides prescriptive guidance for establishing a secure configuration posture for Ubuntu Linux 20.04 LTS."
references:
-
https://www.cisecurity.org/cis-benchmarks/requirements:
title: "Check Ubuntu version."
description: "Requirements for running the SCA scan against Ubuntu Linux 20.04 LTS"
condition: all
rules:
- "f:/etc/os-release -> r:Ubuntu 20.04"
- "f:/proc/sys/kernel/ostype -> Linux"
- "f:/etc/redhat-release -> r:^AlmaLinux && r:release 8"
Once you have added the line - "f:/etc/redhat-release -> r:^AlmaLinux && r:release 8" , save the file and restart the agent.
Finally check the scan results.
I hope this solves the problem. Let us know if it worked or if you have any other questions.