All Collections
Assets and Vulnerabilities
23 articles
Export Assets and VulnerabilitiesLearn how to export Vulnerabilities and Assets.
Magic Search and Filters (VMS)Learn all about Vulcan's search and filtering tool for precise information retrieval.
Using the 'Select All' optionLearn how to use the select-all option on Assets and Vulnerabilities pages
The Findings page
Filtering by specific business Groups may show more results than 'All Business Groups': Understanding the Risk Level filter
Using 'Search anything': Intelligent data search and platform navigation
Assets PageLearn all about the Assets Page in the Vulcan Platform
Understanding Full Asset Deduping and Proactive Asset DetachLearn all about Asset deduplication in the the Vulcan Platform and how the data from different sources merges.
End of Life (EOL) for OS versionLearn about the OS EOL indicators and filters in the Vulcan Platform
Asset DetailsLearn about the information presented in the Asset Details.
The External Facing tagWhat is the External-Facing tag and how to create one?
Inactive Assets
Mapping OS and VersionsMapping between versions with different names according to the operating system.
Managing Asset Tags (old UI)
"Has Fix Type" - Filter vulnerabilities and automate remediation by fix-typeExplore what you can do with the Fix-Type metadata
The Vulnerabilities pageLearn all about the Vulnerabilities Page in the Vulcan Platform
Threat Intelligence Sources and LogicLearn all about Vulcan Threat Intelligence
Vulnerability Software and CVE ClustersView, prioritize and take action on vulnerabilities grouped by affected software or CVE
Vulnerability DetailsLearn all about the information presented in the Unique Vulnarability Details pane
Stay ahead of Log4j - Track from your DashboardTrack Log4J vulnerabilities and available fixes
Vulnerability TagsLearn how to add metadata information to vulnerabilities for your own use
Enhanced Vulnerability TagsLearn about new vulnerability tagging designed to provide you with deeper insights into vulnerabilities and their related attack patterns
Exploit Maturity