Page Overview
The Vulnerabilities Page displays all the vulnerabilities in your organization ingested from the connectors. The Vulnerabilities page is your main pane of glass for viewing, managing, and taking action on vulnerabilities. The page contains three primary tabs:
Unique Vulnerabilities
The Vulcan Platform divides the vulnerabilities into three risk statuses compatible with the vulnerability remediation lifecycle.
“Vulnerable”: Vulnerabilities which represent a risk to your organization. These vulnerabilities can be in one of two statuses:
Vulnerable: There is no remediation campaign opened for this Vulnerability.
In Progress: Vulnerability is associated with a remediation campaign.
“Fixed”: Vulnerabilities that their resolution was validated by a connected scanner and was found to be remediated.
“Ignored”: Vulnerabilities the user had accepted their risk or had chosen to “snooze” remediation activities related to them for a specific time.
The user can view the vulnerabilities filtered by their risk status by clicking the relevant tab.
Each Vulnerability ingested to the Vulcan Platform is enriched with the following:
Integrated connectors feeding the Vulcan platform (Cloud repositories, CMDBs, TI, Agent-based platforms, Etc.)
Threat intelligence (exploits, running campaigns, threat types) and remediation intelligence.
Reviewing Vulnerabilities
Unique Vulnerabilities are displayed in a primary table form that allows you to:
Review basic vulnerability information at a glance
Review vulnerabilities by Risk Severity
Reorganize columns with a simple Drag and Drop
Hover over data for more info
Review Vulnerability Details
Filtering Vulnerabilities
You can use the Magic Search bar and filter to present the vulnerabilities you are interested in.
Apply several filtering criteria to narrow down the search results.
Save filtering criteria to quickly re-apply the search when needed.
Vulnerability filters and table columns
Glancing at vulnerabilities' essential details and filtering vulnerabilities have never been easier. Apply filters to narrow down the vulnerability list and focus your search.
Available table columns and info | Available search filters |
|
|
Reviewing Vulnerability Details
Reading Vulnerability Threat Tags
Exporting Vulnerabilities
Creating Vulnerability Tags
Taking Action on a Vulnerability