Vulnerabilities View
Display more details on the vulnerabilities found on a network and the number of affected computers. When a vulnerability is selected from the Vulnerability List, the Details section provides more information on the selected vulnerability. From the Details section click Affected computers or Unaffected computers to display a list of affected and unaffected computers.
Vulnerabilities view in the
NOTE
Drag and drop a column header in the designated area to group data by criteria.
Configuring actions
From the actions section select one of the actions described below to manage and remediate vulnerabilities and missing patches found in your network.
Remediate |
Launch the Remediation Center to deploy and manage missing patches.
|
Acknowledge |
Launch the Rule-Acknowledge Patch dialog. This enables you to acknowledge issues so that they will not affect the Vulnerability level of your network. Configure for which machine this rule applies. |
Ignore |
Launch the Rule-Ignore Patch dialog. This enables you to ignore missing patches or vulnerabilities so that they will not be reported as issues in the future, and include reasons why to ignore such vulnerabilities. Configure for which machine this rule applies and the time span that the issue is ignored. |
Change Severity |
Launch the Rule-Change Severity dialog. This enables you to change the severity level of vulnerability. Configure for which machines this rule applies and the severity level. |
Rules Manager |
Launch the Rules Manager dialog. This enables you to search and remove configured rules and view the reasons to ignore missing patches and vulnerabilities. |