diff --git a/docs/security-testing-orchestration/sto-techref-category/anchore-enterprise-scanner-reference.md b/docs/security-testing-orchestration/sto-techref-category/anchore-enterprise-scanner-reference.md
index 5053e02cdf2..db30f486605 100644
--- a/docs/security-testing-orchestration/sto-techref-category/anchore-enterprise-scanner-reference.md
+++ b/docs/security-testing-orchestration/sto-techref-category/anchore-enterprise-scanner-reference.md
@@ -12,41 +12,25 @@ sidebar_position: 20
 
 
 
-You can scan your container images with [Anchore Enterprise](https://docs.anchore.com/current/docs/).
+The **Anchore Enterprise** step in Harness STO lets you scan your container images using [Anchore Enterprise](https://docs.anchore.com/current/docs/).  
+This step supports the following scan modes: [Orchestration](#anchore-enterprise-orchestration-example), [Extraction](#scan-mode), and [Ingestion](#scan-mode).
 
-## Important notes for running Anchore Enterprise scans in STO
+Before running Anchore Enterprise scans in STO, make sure the following requirements are met:
 
-### Anchore Enterprise requirements
+- **Anchore API and Version Compatibility**: Use the **Anchore v2 API** and **Anchore Enterprise Server v5.0 or later** when running [Orchestration](#anchore-enterprise-orchestration-example) or [Extraction](#scan-mode) scan modes.
+- **Server Configuration**: When deploying your Anchore Enterprise server, ensure that **port 8228** is exposed. Harness uses this port to communicate with the Anchore server.
+- **Air-Gapped Environments**: If you’re using this step in an air-gapped setup, review the following Anchore documentation for setup and feed synchronization guidance:  
+  - [Running Anchore Enterprise in an Air-Gapped Environment](https://docs.anchore.com/3.0/docs/overview/air_gapped)  
+  - [Anchore Enterprise Feeds](https://docs.anchore.com/current/docs/overview/feeds)
 
-- You must use the Anchore v2 API and Anchore Enterprise Server v5.0 or higher to run orchestration and extraction scans.
 
-When you deploy an Anchore Enterprise server, expose port 8228. Harness uses this port to communicate with the server.
+:::info
+- To run scans as a non-root user, you can use custom STO scan images and pipelines. See [Configure your pipeline to use STO images from private registry](/docs/security-testing-orchestration/use-sto/set-up-sto-pipelines/configure-pipeline-to-use-sto-images-from-private-registry).
+- STO supports multiple workflows for loading self-signed certificates. See [Run STO scans with custom SSL certificates](/docs/security-testing-orchestration/use-sto/secure-sto-pipelines/ssl-setup-in-sto#supported-workflows-for-adding-custom-ssl-certificates).
+:::
 
-### All data ingestion methods are supported
 
-You can run Orchestration, Extraction, and Ingestion workflows with Anchore Enterprise. This topic includes an [Orchestration pipeline example](#anchore-enterprise-orchestration-example) below.
-
-### Scans in air-gapped environments are supported
-
-You can run Anchore Enterprise scans in air-gapped environments. For more information, go to the Anchore Enterprise documentation:
-
-- [Running Anchore Enterprise in an Air-Gapped Environment](https://docs.anchore.com/3.0/docs/overview/air_gapped)
-- [Anchore Enterprise Feeds](https://docs.anchore.com/current/docs/overview/feeds)
-
-### Root access requirements
-
-import StoRootRequirements from '/docs/security-testing-orchestration/sto-techref-category/shared/root-access-requirements.md';
-
-
-
-### For more information
-
-import StoMoreInfo from '/docs/security-testing-orchestration/sto-techref-category/shared/more-information.md';
-
-
-
-
-## Anchore Enterprise step settings in STO
+## Anchore Enterprise step settings
 
 The recommended workflow is to add an Anchore Enterprise step to a Build or Security stage and then configure it as described below. 
 
@@ -61,6 +45,9 @@ import StoSettingScanModeData from './shared/step-palette/scan/mode/extraction.m
 import StoSettingScanModeIngest from './shared/step-palette/scan/mode/ingestion.md';
 
 
+
+Refer to the [Orchestration setup](#anchore-enterprise-orchestration-example) section below to learn how to configure the **Orchestration** scan mode.
+
 
 
 
@@ -71,6 +58,11 @@ import StoSettingProductConfigName from './shared/step-palette/scan/config-name.
 
 
 
+This option allows you to set the Anchore's `VULN_TYPE` parameter. This setting filters the records returned to STO; it does not change how Anchore analyzes images.
+
+- **Default** or **All**: Combination report containing both **OS** and **Non-OS** vulnerability records.
+- **OS**: Vulnerabilities against operating system packages (RPM, DPKG, APK, etc.).
+- **Non-OS**: Vulnerabilities against language packages (NPM, GEM, Java Archive (jar, war, ear), Python PIP, .NET NuGet, etc.).
 
 ### Target
 
@@ -334,6 +326,3 @@ pipeline:
 ```
 
 
-
-
-
diff --git a/docs/security-testing-orchestration/sto-techref-category/github-advanced-security.md b/docs/security-testing-orchestration/sto-techref-category/github-advanced-security.md
index b480a73fc9d..3a05c68ffe8 100644
--- a/docs/security-testing-orchestration/sto-techref-category/github-advanced-security.md
+++ b/docs/security-testing-orchestration/sto-techref-category/github-advanced-security.md
@@ -20,7 +20,7 @@ The GitHub Advanced Security (GHAS) step in Harness STO enables you to scan your
 
 :::info
 - To run scans as a non-root user, you can use custom STO scan images and pipelines. See [Configure your pipeline to use STO images from private registry](/docs/security-testing-orchestration/use-sto/set-up-sto-pipelines/configure-pipeline-to-use-sto-images-from-private-registry).
-- STO supports multiple workflows for loading self-signed certificates. See [Run STO scans with custom SSL certificates](/docs/security-testing-orchestration/use-sto/secure-sto-pipelines/ssl-setup-in-sto/#supported-workflows-for-adding-custom-ssl-certificates).
+- STO supports multiple workflows for loading self-signed certificates. See [Run STO scans with custom SSL certificates](/docs/security-testing-orchestration/use-sto/secure-sto-pipelines/ssl-setup-in-sto#supported-workflows-for-adding-custom-ssl-certificates).
 :::
 
 ## GitHub Advanced Security step settings