diff --git a/README.md b/README.md
index d71882e..5c08582 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,21 @@
-# Sysdig Secure Inline Scan Examples
+
-This repository contains examples and information about **how to use** [Sysdig Secure inline scan](https://docs.sysdig.com/en/integrate-with-ci-cd-tools.html) in different integrations and use case scenarios.
+# Sysdig Vulnerability Scan Examples
+
+
+
+
Sysdig Vulnerability Scan Examples
+
+
+| :warning: **As of April 20, 2022, Sysdig offers both a Legacy Scanner engine and the newer Vulnerability Management engine. See the [official documentation](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/new-scanning-engine/#which-engine-is-enabled-now) to understand which engine is enabled into your account.** |
+| --- |
+
+
+
+This repository contains examples and information about using in different integrations and use case scenarios both the:
+
+* [Sysdig Secure inline scan](https://docs.sysdig.com/en/integrate-with-ci-cd-tools.html) - Refered as `old-scan-engine`
+* [Sysdig Pipeline Vulnerability Management engine](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/pipeline/) - Refered as `new-scan-engine`
Continue reading the public webpage content of this repository here:
@@ -15,6 +30,6 @@ If you find a related topic that lacks enough information or some problem with a
## More information
* [Sysdig.com](https://sysdig.com)
-* [Sysdig Documentation website - Image Scanning](https://docs.sysdig.com/en/scanning.html)
-* [Image Scanning - Integrate with CI/CD Tools](https://docs.sysdig.com/en/integrate-with-ci-cd-tools.html)
-
+* [Running the CLI scanner](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/pipeline/#running-the-cli-scanner)
+* [Legacy Scanning engine](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/)
+* [Legacy Scanning engine - Integrate with CI/CD Tools](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/integrate-with-cicd-tools/)
diff --git a/new-scan-engine/aws-codebuild/README.md b/aws-codebuild/new-scan-engine/README.md
similarity index 100%
rename from new-scan-engine/aws-codebuild/README.md
rename to aws-codebuild/new-scan-engine/README.md
diff --git a/new-scan-engine/aws-codebuild/build.yaml b/aws-codebuild/new-scan-engine/build.yaml
similarity index 100%
rename from new-scan-engine/aws-codebuild/build.yaml
rename to aws-codebuild/new-scan-engine/build.yaml
diff --git a/docs/index.md b/docs/index.md
index 4c26b30..92c90af 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -1,11 +1,117 @@
---
-title: Sysdig Secure Inline Scan Examples
+title: Sysdig Vulnerability Scan Examples
summary: >
This is not a comprehensive catalog of examples for all integrations available, but a live document where we continually publish more information as we see users need it.
We do try to keep a list of links to all integrations and other related websites that you may find useful.
---
-# Common scenarios & recipes
+# Legacy Scanner engine vs Vulnerability Management engine
+
+**As of April 20, 2022, Sysdig offers both a Legacy Scanner engine and the newer Vulnerability Management engine. See the [official documentation](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/new-scanning-engine/#which-engine-is-enabled-now) to understand which engine is enabled into your account.**
+
+- [Vulnerability Management engine common scenarios & recipes](#vulnerability-management-engine-common-scenarios---recipes)
+ * [Download the `sysdig-cli-scanner`](#download-the--sysdig-cli-scanner-)
+ * [Scan local image, built using docker](#scan-local-image--built-using-docker)
+ * [Local image (provided docker archive)](#local-image--provided-docker-archive-)
+ * [Public registry image](#public-registry-image)
+ * [Private registry image](#private-registry-image)
+ * [Containers-storage (cri-o, podman, buildah and others)](#containers-storage--cri-o--podman--buildah-and-others-)
+- [Legacy Scanner engine common scenarios & recipes](#legacy-scanner-engine-common-scenarios---recipes)
+ * [Scan local image, built using docker](#scan-local-image--built-using-docker-1)
+ * [Local image (provided docker archive)](#local-image--provided-docker-archive--1)
+ * [Public registry image](#public-registry-image-1)
+ * [Private registry image](#private-registry-image-1)
+ * [Containers-storage (cri-o, podman, buildah and others)](#containers-storage--cri-o--podman--buildah-and-others--1)
+ * [Using a proxy](#using-a-proxy)
+- [Other integrations and examples](#other-integrations-and-examples)
+ * [Vulneratbility Management Engine (new scan engine)](#vulneratbility-management-engine--new-scan-engine-)
+ * [Legacy Scanner Engine (old scan engine)](#legacy-scanner-engine--old-scan-engine-)
+- [Other sources of information](#other-sources-of-information)
+ * [Integrations](#integrations)
+ * [Documentation pages](#documentation-pages)
+ * [Blog articles](#blog-articles)
+- [Contributing](#contributing)
+
+# Vulnerability Management engine common scenarios & recipes
+
+## Download the `sysdig-cli-scanner`
+
+Linux or MacOS:
+
+```
+curl -LO "https://download.sysdig.com/scanning/bin/sysdig-cli-scanner/$(curl -L -s https://download.sysdig.com/scanning/sysdig-cli-scanner/latest_version.txt)/$(uname -s | tr '[:upper:]' '[:lower:]')/amd64/sysdig-cli-scanner"
+```
+
+Set the executable flag on the file:
+
+```
+chmod +x ./sysdig-cli-scanner
+```
+
+You only need to download and set executable once. Then you can scan images by running the `sysdig-cli-scanner` command:
+
+```
+SECURE_API_TOKEN=