Page Overview
The Vulnerabilities Page displays all the vulnerabilities in your organization ingested from the connectors. The Vulnerabilities page is your main pane of glass for viewing, managing, and taking action on vulnerabilities. The page contains three primary tabs:
Unique Vulnerabilities
The Vulcan Cyber ExposureOS platform divides the vulnerabilities into three risk statuses compatible with the vulnerability remediation lifecycle.
“Vulnerable”: Vulnerabilities that represent a risk to your organization. These vulnerabilities can be in one of two statuses:
Vulnerable: There is no remediation campaign opened for this Vulnerability.
In Progress: Vulnerability is associated with a remediation campaign.
“Fixed”: Vulnerabilities that their resolution was validated by a connected scanner and was found to be remediated.
“Acknowledged”: Vulnerabilities the user had accepted their risk or had chosen to “snooze” remediation activities related to them for a specific time.
Use the Filter (Magic Search) to narrow down your search and find the vulnerabilities that matter to you most.
Each Vulnerability ingested to the Vulcan Cyber ExposureOS platform is enriched with the following:
Integrated connectors feeding the Vulcan Cyber ExposureOS platform (Cloud repositories, CMDBs, TI, Agent-based platforms, Etc.)
Threat intelligence (exploits, running campaigns, threat types) and remediation intelligence.
Reviewing Vulnerabilities
Unique Vulnerabilities are displayed in a primary table form that allows you to:
Review basic vulnerability information at a glance
Review vulnerabilities by Risk Severity
Reorganize columns with a simple Drag and Drop
Hover over data for more info
Review Vulnerability Details
Filtering Vulnerabilities
Apply several filtering criteria to narrow down the search results.
Save filtering criteria to quickly re-apply the search when needed.
Column Picker
Drag and drop the columns to change the order from the main view.
Restore to default system columns.
The order and selection of columns are saved per user.
Reviewing Vulnerability Details
Reading Vulnerability Threat Tags
Exporting Vulnerabilities
Creating Vulnerability Tags
Taking Action on a Vulnerability