Infraon Infinity
API DocsAdmin GuideUser GuideVideo LibraryResources
  • Infraon Documentation
  • Explore More
    • What's New
    • Use Cases
      • Dashboard
        • Default Dashboard
        • Add a Dashboard
        • Miscellaneous
      • Asset
        • IT & Fixed Asset
          • Asset Categories
          • Add Asset
            • Adding an Asset Manually
            • Adding an asset using CSV
            • Adding an asset using Inventory Agent
          • Miscellaneous
        • Software Inventory
        • Software License Management
        • CMDB view
      • Ticket Management
        • Ticket Creation
          • Created by Techician
          • Email to incident
          • Self Service Portal
          • Trigger Configuration
        • Ticket Assignment
          • Ticket Assignment (Manual)
          • Ticket Assignment (Automatic)
        • Ticket Resolution
        • Miscellaneous
    • Handbooks
    • Video Library: Infraon Infinity
      • Dashboard
      • Assets
        • IT & Fixed Asset
          • Add an Asset
        • Software Inventory
        • Software License
        • CMDB View
      • Ticket Management
        • Ticket Creation
        • Ticket Assignment
        • Ticket Resolution
        • Miscellaneous
      • Request Management
      • Problem Management
      • Change Management
      • Release Management
      • Event Management
      • Report
      • SLA Management
      • Network Diagram
      • Topology
      • Geomap
      • Infraon Configuration
        • General Settings
        • User Management
        • Service Management
        • Notifications
        • Infraon Automation
        • Bots
        • Organization
        • IT Operations
          • Advance Resource Configuration
          • Blacklist and Whitelist
          • Discovery
          • Diagnosis Tools
          • Device Credentials
          • Maintenance
          • Correlation Rules
          • Network Configuration
          • Thresholds
  • Infinity Admin Guide
    • Overview
    • Getting Started
      • Welcome to Infraon!
      • Know Infraon!
      • User's first login
  • Infraon Platform
    • Account Signup
    • CI Rule Configuration
    • Infraon URL
    • Login Settings
    • Module Prefix Configuration
    • Rebrand Infraon
    • Template Configuration
    • Vendor
    • SSP Configuration
  • Infinity User Guide
    • Introduction
    • Workspace
    • Dashboard
      • Widgets
      • Add a Dashboard
    • Asset
      • Asset Lifecycle
      • How does it work?
      • Asset Types
      • Asset Categories/Sub-Categories
      • Asset Grid Page
      • Add Asset/Add Item
      • Asset Information – SDH / PDH
      • Consumable Asset (Beta)
      • Software Assets
      • Software License
      • CMDB View
        • CI relationship in CMDB Downstream
        • CI relationship in CMDB Upstream
    • Contract Management
      • Add contract
    • NCCM
      • Download Job
      • Calendar View
    • IMACD (Beta)
      • Instructions to add a process
      • Gate pass
    • Ticket Management
      • Tickets
      • Add ticket
    • Request Management
      • Request
      • Add Request
    • Problem Management
      • Problem
      • Add Problem
    • Change Management
      • Change
      • Add Change
    • Log Management
      • Log Search
      • Log Stream
    • Release Management
      • What you see on the screen
      • Instructions to add a New Release
    • Event Management
      • Events
    • Report
      • How does it work
      • Add Report
    • Knowledge Base
      • Infraon's Knowledge Base
    • SLA Management
      • SLA
      • Profile
    • Geomap
      • What you see on the screen
    • Network Diagram (Beta)
      • How does it work?
    • Topology
      • Topological Links
    • Infraon Configuration
      • General Settings
        • Audits
        • Business Hours
        • Tag Management
        • API Registration
      • User Management
        • Department
        • Active users
        • Leaves
        • My Leaves
        • Password Policy
        • Requesters
        • Roles & Privileges
        • Teams
        • Users
        • Shift Configuration
      • Service Management
        • Service Catalogue
      • Notifications
        • Configure SMS
        • Configure SMTP
        • Messenger Audit
        • Trigger Configuration
      • Infraon Automation
        • Business Rule
          • Manual Service Mapping
        • Escalation
        • Email Integration
        • Customer Feedback Template
        • Mail Automator
        • Microsoft Outlook
        • Workflow
          • Advanced Options
          • Task Workflow
      • Bots
        • Bots assistance
        • Data Collector
        • Inventory Agent
      • Organization
        • Address Book
        • License
        • Asynchronous Task Manager
      • IT Operations
        • Advance Resource Configuration
        • Blacklist and Whitelist
        • CLI Jobs
        • Circuit Discovery
        • Device Credentials
        • Diagnosis Tools
        • Discovery
          • Automatic Discovery
          • Network Discovery
          • Windows Servers
          • Linux Servers
          • Hypervisor Monitoring
          • VMware
          • URL/ Web Services
          • Wireless Controller
        • Job Progress
        • Maintenance
        • Network Configuration
          • Baseline Scheduler
          • Configuration Comparison
          • Configuration File Compare
          • Configuration Parameters
          • Configuration Profile
          • Configuration Search
          • Configuration Template
            • What you see on the screen
            • How to write Command Portion in Template
            • Conditioning in Template
            • Guidelines for Configuration Template
            • Add Template
              • Miscellaneous
          • Generate MD5
          • Jobs Account Audit
          • OS Image
            • OS Image Download Scheduler
          • Configuration Trigger
          • Job(s) Retry Queue
          • Workflow Jobs
          • Rules
          • Rule Group
          • Policy
          • Manage Vulnerabilities
            • Vulnerabilities by CVE
            • Vulnerabilities by Assets
            • Vulnerabilities Database
          • Download Jobs
            • What you see on the screen
            • Add Download Job
          • Upload Jobs
            • What you see on the screen
            • Add Upload Job
          • Service Template
            • Service Job
          • Authentication Profile
          • Authorization Profile
        • Rules
          • Log Rule
          • Correlation Rule
        • Thresholds
        • Trap Configuration
      • Log Management
        • Log Multi-Index
        • Log Search
        • Log Stream
        • Export Configs
    • Marketplace (Beta)
      • Azure Active Directory
      • Infraon Dell
      • Google Workspace
      • Infraon JAMF
      • Infraon ServiceNow
      • Infraon Slack
      • Infraon Teams
      • Infraon WhatsApp
      • Infraon Ring Central
      • Infraon LDAP
      • Infraon JIRA
Powered by GitBook
On this page

Was this helpful?

  1. Infinity User Guide
  2. Infraon Configuration
  3. IT Operations
  4. Network Configuration

Manage Vulnerabilities

This privilege-based feature allows users to identify, manage, and address vulnerabilities across all network devices. It enables users to access, view, add, edit, delete, execute, and export data as permitted by roles and privileges defined by the administrator.

The module provides detailed insights into vulnerabilities based on device OS, affected nodes, vendor details, CVE, OS version, and more.

What you see on the screen

This page comprehensively overviews all detected vulnerabilities across devices, categorized by vendor. It includes details such as operating system (OS) information, nodes affected, and the total vulnerability count for each category. The categorization by OS and affected nodes helps users prioritize and take targeted actions for effective vulnerability management.

Additionally, if a newer OS version is available with an associated OS image, users can upload it directly by clicking the action icon. This streamlined process ensures that updates and remediation efforts are efficiently managed.

Action Icons | Manage Vulnerabilities |

Label

Action

Description

Search

Search for specific vulnerabilities by Vendor, OS Name, or other identifiers.

Allows users to locate vulnerabilities based on specific criteria quickly.

Filter

Apply filters using fields and conditions from the dropdown menu.

Fields include Vendor, OS Name, Is Resolved, and IP Address. Conditions include "in," "not in," "contains," "not contains," "equal to," and "not equal to."

Vulnerabilities by CVE

Navigate to view vulnerabilities categorized by CVE.

Categorizes vulnerabilities by CVE IDs, enabling teams to assess their severity using CVSS scores. Supports rule-based responses for efficient threat mitigation.

Vulnerabilities by Assets

Navigate to view vulnerabilities categorized by assets.

Displays vulnerabilities by asset details, including IP address, hostname, OS name/version, and Vulnerability ID. Users can view categorized summaries for targeted action.

Vulnerabilities Database

Navigate to view the vulnerabilities database.

Centralized repository with external feeds (e.g., NVD), categorizing data by vendor, OS details, mitigation actions, and more for tracking threats and customizing policies.

Export

Export the data in Excel (XLSX) format.

Downloads the Manage Vulnerabilities page data for further analysis or reporting.

OS Upload Job

Execute an OS upload job.

If a new OS version is detected, an action icon and OS image become available for a vendor/series in NCCM. Users can click to initiate the upload job. Clicking the "Nodes Affected" count redirects to a list of impacted devices.

Below is the list of fields that can be viewed from this page:

  • Vendor

  • Series

  • OS Name

  • OS Version

  • Total Vulnerabilities

  • Open Vulnerabilities

  • Nodes Affected

  • Is Resolved

  • Latest OS Version

  • Latest OS Version in NCCM

  • OS Image

PreviousPolicyNextVulnerabilities by CVE

Last updated 5 months ago

Was this helpful?