Role Availability | Read-Only | Investigator | Analyst | Manager |
Column Field Name | Description |
---|---|
Last Seen | Last date on which the vulnerability was seen in the asset. The displayed date depends on your computer’s time zone. |
Vulnerability ID | Displays the associated Common Vulnerabilities and Exposures (CVE) ID, in case of having it. |
Suppressed | Indicates whether this vulnerability is marked as suppressed. See Viewing Vulnerabilities Details for more information. |
Vulnerability Description | Displays the description of the vulnerability. |
Labels | Label applied to the vulnerability. See Labeling the Vulnerabilities for more information. |
Source | Source that found the vulnerability. |
Asset | Asset that is vulnerable. |
Severity | Indicates the severity of the vulnerability. Values are High, Medium, Low, and Under Analysis. See About Vulnerability Severity. |
Score | Displays the score in the Common Vulnerability Scoring System (CVSS). See Common Vulnerability Scoring System SIG for more information. |
First Seen | Detection date of the vulnerability in the asset. The displayed date depends on your computer’s time zone. |
Available Patches | Displays the name of the patch and the number of additional available patches (for example, patch name & [2 more patches]). |
IP of the Assets | Displays the IP of the assets, if available. |
Affected Software | Displays the name of the affected software and the number additionally affected (for example, software name & [3 more]). |
- Apply Labels: You can add a label to a vulnerability, which enables you to have classified vulnerabilities. See Labeling the Vulnerabilities for more information.
- New Scan: This button runs a new authenticated asset scan. See Running an Asset Scan from Vulnerabilities for more information. You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.
Note: You can view your bookmarked items by going to the secondary menu and clicking the
icon. This will display all of your bookmarked items and provide direct links to each of them.
- Add to Current Filter: Use this option to add the asset name as a search filter. See Searching Events for more information.
- Find in Events: Use this option to execute a search of the asset name in the Events page. See Searching Events for more information.
- Look up in OTX: This option searches the IP address of the asset in the OTX page. See Using OTX in USM Anywhere for more information.
- Full Details: See Viewing Assets Details for more information.
- Configure Asset: See Editing Assets for more information.
- Delete Asset: See Deleting the Assets for more information.
- Assign Credentials: See Managing Credentials in USM Anywhere for more information.
- : This option displays depending on the USM Anywhere Sensor associated with the asset. See Running Authenticated Asset Scans for more information.
- Scan with BlueApp: This option enables you to run an asset scan through an BlueApp. See Running Asset Scans Using a BlueApp for more information.
- : This option opens the Assets Details page. The Configuration Issues tab is selected in the page. See Viewing Assets Details for more information.
- Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selected in the page. See Viewing Assets Details for more information.
- Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page. See Viewing Assets Details for more information.
- : This option opens the Assets Details page. The Events tab is selected in the page. See Viewing Assets Details for more information.