Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Company Problems - Table of Contents

Table of Contents
minLevel1
maxLevel6
include
outlinefalse
indent
excludeCompany Problems - Table of Contents
typelist
class
printablefalse

...

Company Problems - Overview

As part of the v4 V4 release, we have designed a new screen that provides a fresh view of what we call 'Problem Groups.' With this new screen, the system will automatically classify your vulnerabilities into logical groups, making it easier for you to remediate them. It will also help you generate accurate reports catering to your specific needs.

...

Company Problems - Details

Problem Details include the following data fields: Problem Name, Description, Assets, Score, and Severity. These details will update be updated based on the Problem Group Name selected.

Field Label

Description / General Use

Problem Name

Displays the detected vulnerabilities CVE-ID

Description

Provides a description of the CVE-ID (Problem Name)

Assets

Displays the count of Assets with the CVE-ID (Problem Name)

Score

Displays the Base, EPSS, Exploitability, and Impact Scores.

Severity

Displays the Severity of the CVE-ID (Problem Name)

...

Global Problem Group Name - Glossary of Terms

The system automatically classifies discovered vulnerabilities into the specific Problem Group Names in the table below.

Problem Group Name

Description / Use Case

0.85 > EPSS >= 0.90

Vulnerabilities grouped by EPSS Scoring >=85/90%

0.90 > EPSS >= 0.85

Vulnerabilities grouped by EPSS Scoring >=90/95%

0.95 > EPSS >= 0.90

Vulnerabilities grouped by EPSS Scoring >=90/95%

Antivirus Not Installed

 

Vulnerabilities grouped by AV checks; not installed.

Backup Not Performed

Vulnerabilities grouped by Backup Software check. 

CISA Notified Vulnerabilities

Vulnerabilities grouped by CISA classification; source CISA.GOV

Critical Vulnerabilities

Vulnerabilities grouped by severity of Critical

Database Vulnerabilities

Vulnerabilities grouped by category of Database. 

EPSS >= 0.95

Vulnerabilities grouped by EPSS Scoring >=95%

Firewall Misconfiguration

 

 Vulnerabilities grouped by category of Firewall misconfig

High Severity Vulnerabilities

Vulnerabilities grouped by severity of High

Information Disclosure

 

Vulnerabilities grouped by category of Info Disclosure

Informational

 

 Vulnerabilities grouped by category of Info Only

Low Severity Vulnerabilities

Vulnerabilities grouped by severity of Low

Mail Vulnerabilities

 

Vulnerabilities grouped by category of Mail 

Medium Severity Vulnerabilities

Vulnerabilities grouped by severity of Medium

Operating System out of Support

 

 Operating Out of Support

Remote Access Vulnerabilities

 

Vulnerabilities grouped by category of Remote Access

Remote Login Vulnerabilities

 

Vulnerabilities grouped by category of Remote Login

Running Services

 

Vulnerabilities grouped by category of Running Services

SMB Vulnerabilities

 

Vulnerabilities grouped by category of SMB

SSL Certificate Info

 

Vulnerabilities grouped by category of Certifcates

SSL/TLS Vulnerabilities

 

 Vulnerabilities grouped by category of SSL/TLS

Web Server Fingerprint

 

Vulnerabilities grouped by category of Web Server Fingerprint 

...

Company Problems - Side Navigation Toolbar Overview

image-20240104-163412.pngImage Removedimage-20240201-200618.pngImage Added

  1. Problems Suppress - tap to suppress a problem; select at least one problem to use the suppression feature.

  2. Problems Suppressed Records - tap to view any problems previously suppressed.

  3. Jobs - tap to view any scan scanned jobs and their current status.

  4. Alerts - tap to view System Events, time-line style.

    Dashboard - tap to be redirected to our external dashboard builder.

...


Company Problems - Side Navigation Toolbar Actions

Problems Suppress

To suppress a problem, click the checkbox to select and then tap the Problems Suppress icon.

...

Selecting the Self Approve options requires a Comment, Start Date, and End Date.

...

You will be prompted to choose a User Type when using the system provided by Other User. You can either select Internal User or External User.

If you choose Internal User, you will see a drop-down list from where which you can select the specific Internal User who is supposed to will receive the email notification for this impression.

On the other hand, if you choose External User, you will need to must enter the email addresses separated by commas of those who will receive the approval email.

Problems Suppressed Records

Jobs

Alerts

...

Jobs

Tap to view Scan Job(s) historical data, which includes Created, Scan Type, Agent Name, Job Status, and Description.

...

Alerts

Tap to view the System Events, timeline-style alerts.

...