Manage Vulnerabilities
This privilege-based feature allows users to identify, manage, and address vulnerabilities across all network devices. It enables users to access, view, add, edit, delete, execute, and export data as permitted by roles and privileges defined by the administrator.
The module provides detailed insights into vulnerabilities based on device OS, affected nodes, vendor details, CVE, OS version, and more.
What you see on the screen
This page comprehensively overviews all detected vulnerabilities across devices, categorized by vendor. It includes details such as operating system (OS) information, nodes affected, and the total vulnerability count for each category. The categorization by OS and affected nodes helps users prioritize and take targeted actions for effective vulnerability management.
Additionally, if a newer OS version is available with an associated OS image, users can upload it directly by clicking the action icon. This streamlined process ensures that updates and remediation efforts are efficiently managed.
Action Icons | Manage Vulnerabilities |
Label
Action
Description
Search
Search for specific vulnerabilities by Vendor, OS Name, or other identifiers.
Allows users to locate vulnerabilities based on specific criteria quickly.
Filter
Apply filters using fields and conditions from the dropdown menu.
Fields include Vendor, OS Name, Is Resolved, and IP Address. Conditions include "in," "not in," "contains," "not contains," "equal to," and "not equal to."
Vulnerabilities by CVE
Navigate to view vulnerabilities categorized by CVE.
Categorizes vulnerabilities by CVE IDs, enabling teams to assess their severity using CVSS scores. Supports rule-based responses for efficient threat mitigation.
Vulnerabilities by Assets
Navigate to view vulnerabilities categorized by assets.
Displays vulnerabilities by asset details, including IP address, hostname, OS name/version, and Vulnerability ID. Users can view categorized summaries for targeted action.
Vulnerabilities Database
Navigate to view the vulnerabilities database.
Centralized repository with external feeds (e.g., NVD), categorizing data by vendor, OS details, mitigation actions, and more for tracking threats and customizing policies.
Export
Export the data in Excel (XLSX) format.
Downloads the Manage Vulnerabilities page data for further analysis or reporting.
OS Upload Job
Execute an OS upload job.
If a new OS version is detected, an action icon and OS image become available for a vendor/series in NCCM. Users can click to initiate the upload job. Clicking the "Nodes Affected" count redirects to a list of impacted devices.
Below is the list of fields that can be viewed from this page:
Vendor
Series
OS Name
OS Version
Total Vulnerabilities
Open Vulnerabilities
Nodes Affected
Is Resolved
Latest OS Version
Latest OS Version in NCCM
OS Image
Last updated