Role AvailabilityRead-OnlyInvestigatorAnalystManager
For each vulnerability in the vulnerabilities columns list, USM Anywhere displays useful information to help you manage that vulnerability. The following table lists the fields you see on the page. List of the Default Columns in Vulnerabilities
Column Field NameDescription
Last SeenLast date on which the vulnerability was seen in the asset. The displayed date depends on your computer’s time zone.
Vulnerability IDDisplays the associated Common Vulnerabilities and Exposures (CVE) ID, in case of having it.
SuppressedIndicates whether this vulnerability is marked as suppressed. See Viewing Vulnerabilities Details for more information.
Vulnerability DescriptionDisplays the description of the vulnerability.
LabelsLabel applied to the vulnerability. See Labeling the Vulnerabilities for more information.
SourceSource that found the vulnerability.
AssetAsset that is vulnerable.
SeverityIndicates the severity of the vulnerability. Values are High, Medium, Low, and Under Analysis. See About Vulnerability Severity.
ScoreDisplays the score in the Common Vulnerability Scoring System (CVSS). See Common Vulnerability Scoring System SIG for more information.
First SeenDetection date of the vulnerability in the asset. The displayed date depends on your computer’s time zone.
Available PatchesDisplays the name of the patch and the number of additional available patches (for example, patch name & [2 more patches]).
IP of the AssetsDisplays the IP of the assets, if available.
Affected SoftwareDisplays the name of the affected software and the number additionally affected (for example, software name & [3 more]).
From the list of vulnerabilities, you can click any individual vulnerability row to display more information on the selected vulnerability. See Viewing Vulnerabilities Details for more information. To select a vulnerability, select the checkbox to the left of the vulnerability. You can select all vulnerabilities at the same time by selecting the first checkbox in the column. These buttons display when you select a vulnerability:
  • Apply Labels: You can add a label to a vulnerability, which enables you to have classified vulnerabilities. See Labeling the Vulnerabilities for more information.
  • New Scan: This button runs a new authenticated asset scan. See Running an Asset Scan from Vulnerabilities for more information. You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.
Click the icon to bookmark an item for quick access.
Note: You can view your bookmarked items by going to the secondary menu and clicking the icon. This will display all of your bookmarked items and provide direct links to each of them.
Click Generate Report to open the Configure Report dialog box. See Create a Vulnerabilities Report for more information. Click the icon displayed next to the asset name below the asset column to access the following options. Your access to these options may vary based on your user role. See Role-Based Access Control (RBAC) in USM Anywhere for more information:
  • Add to Current Filter: Use this option to add the asset name as a search filter. See Searching Events for more information.
  • Find in Events: Use this option to execute a search of the asset name in the Events page. See Searching Events for more information.
  • Look up in OTX: This option searches the IP address of the asset in the OTX page. See Using OTX in USM Anywhere for more information.
  • Full Details: See Viewing Assets Details for more information.
  • Configure Asset: See Editing Assets for more information.
  • Delete Asset: See Deleting the Assets for more information.
  • Assign Credentials: See Managing Credentials in USM Anywhere for more information.
  • : This option displays depending on the USM Anywhere Sensor associated with the asset. See Running Authenticated Asset Scans for more information.
  • Scan with BlueApp: This option enables you to run an asset scan through an BlueApp. See Running Asset Scans Using a BlueApp for more information.
  • : This option opens the Assets Details page. The Configuration Issues tab is selected in the page. See Viewing Assets Details for more information.
  • Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selected in the page. See Viewing Assets Details for more information.
  • Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page. See Viewing Assets Details for more information.
  • : This option opens the Assets Details page. The Events tab is selected in the page. See Viewing Assets Details for more information.