Vulnerabilities Page

Learn all about the Vulnerabilities Page in the Vulcan Platform

Updated over a week ago

Page Overview

The Vulnerabilities Page displays all the vulnerabilities in your organization ingested from the connectors. The Vulnerabilities page is your main pane of glass for viewing, managing, and taking action on vulnerabilities. The page contains three primary tabs:

Unique Vulnerabilities

The Vulcan Platform divides the vulnerabilities into three risk statuses compatible with the vulnerability remediation lifecycle.

Use the Filter (Magic Search) to narrow down your search and find the vulnerabilities that matter to you most.

Each Vulnerability ingested to the Vulcan Platform is enriched with the following:

Reviewing Vulnerabilities

Unique Vulnerabilities are displayed in a primary table form that allows you to:

  • Review basic vulnerability information at a glance

  • Review vulnerabilities by Risk Severity

  • Reorganize columns with a simple Drag and Drop

  • Hover over data for more info

  • Review Vulnerability Details

Enabling the Vulnerability Instance Mode

You can access vulnerability instance details by enabling the Vulnerability Instance Mode toggle. The Vulnerability Instance View provides simplified, direct access to instance data.

Once enabled, you'll get a view of instances. Each Vulnerability Instance has its own dedicated card, presenting all relevant information in one place.

Filtering Vulnerabilities

  • Apply several filtering criteria to narrow down the search results.

  • Save filtering criteria to quickly re-apply the search when needed.

Column Picker

Glancing at asset essential details is made easy through the informative Asset Table that presents essential asset information.

  • Drag and drop the columns to change the order from the main view.

  • Add/remove columns using the Column Picker. This is also where you can drag and drop the columns to change the order.

  • Restore to default system columns.

  • The order and selection of columns are saved per user.

Reviewing Vulnerability Details

Reading Vulnerability Threat Tags

Exporting Vulnerabilities

Creating Vulnerability Tags

Taking Action on a Vulnerability

Did this answer your question?