Page Overview
The Vulnerabilities Page displays all the vulnerabilities in your organization ingested from the connectors. The Vulnerabilities page is your main pane of glass for viewing, managing, and taking action on vulnerabilities. The page contains three primary tabs:
Unique Vulnerabilities
The Vulcan Platform divides the vulnerabilities into three risk statuses compatible with the vulnerability remediation lifecycle.
“Vulnerable”: Vulnerabilities that represent a risk to your organization. These vulnerabilities can be in one of two statuses:
Vulnerable: There is no remediation campaign opened for this Vulnerability.
In Progress: Vulnerability is associated with a remediation campaign.
“Fixed”: Vulnerabilities that their resolution was validated by a connected scanner and was found to be remediated.
“Acknowledged”: Vulnerabilities the user had accepted their risk or had chosen to “snooze” remediation activities related to them for a specific time.
Use the Filter (Magic Search) to narrow down your search and find the vulnerabilities that matter to you most.
Each Vulnerability ingested to the Vulcan Platform is enriched with the following:
Integrated connectors feeding the Vulcan platform (Cloud repositories, CMDBs, TI, Agent-based platforms, Etc.)
Threat intelligence (exploits, running campaigns, threat types) and remediation intelligence.
Reviewing Vulnerabilities
Unique Vulnerabilities are displayed in a primary table form that allows you to:
Review basic vulnerability information at a glance
Review vulnerabilities by Risk Severity
Reorganize columns with a simple Drag and Drop
Hover over data for more info
Review Vulnerability Details
Enabling the Vulnerability Instance Mode
You can access vulnerability instance details by enabling the Vulnerability Instance Mode toggle. The Vulnerability Instance View provides simplified, direct access to instance data.
Once enabled, you'll get a view of instances. Each Vulnerability Instance has its own dedicated card, presenting all relevant information in one place.
Filtering Vulnerabilities
Apply several filtering criteria to narrow down the search results.
Save filtering criteria to quickly re-apply the search when needed.
Column Picker
Glancing at asset essential details is made easy through the informative Asset Table that presents essential asset information.
Drag and drop the columns to change the order from the main view.
Add/remove columns using the Column Picker. This is also where you can drag and drop the columns to change the order.
Restore to default system columns.
The order and selection of columns are saved per user.
Reviewing Vulnerability Details
Reading Vulnerability Threat Tags
Exporting Vulnerabilities
Creating Vulnerability Tags
Taking Action on a Vulnerability