Skip to main content

Vulnerability Management - Current Status

Explore detailed analysis techniques for system vulnerabilities and security improvements with the Current Status view.

Updated over a year ago

Current Status of System Vulnerabilities

The Current Status view within Vulnerability management provides you with a detailed analysis of your system's vulnerabilities, helping you understand risk trends and identify potential areas for improvement in security.


Prerequisites

To use Vulnerability Management in the Arxus Portal you need;

  • Access to the Arxus portal with the appropriate permissions to use this feature.

  • Your company must have you activated this service with Arxus.

How to activate?

If your company has this service active, and you still can’t use it, contact your company portal administrator (usually this person, is who in your company has “Full Role” rights to the users and permission section).


Summary Metrics

In the Current Status view, you will find:

  • Critical Vulnerabilities: Displays the count of critical vulnerabilities found.

  • High Vulnerabilities: Shows the number of high-risk vulnerabilities.

  • Medium Vulnerabilities: Presents the total number of medium-risk vulnerabilities.

  • Low Vulnerabilities: Indicates the count of low-risk vulnerabilities.

Visual Data Representation

The Current Status view also includes:

  • Systems with Most Open Vulnerabilities: A bar graph showing which systems have the most open vulnerabilities, categorized by risk rating. This helps you identify the most vulnerable systems in your network.

  • Count of Open Vulnerabilities by Product and Risk Rating: A bar graph illustrating the count of open vulnerabilities by product and their associated risk rating, providing a clear view of which products are most vulnerable.

  • Amount of Open Vulnerable Items with Exploits Available: A table and bar graph indicating the number of open vulnerabilities that have an exploit available, categorized by risk rating. This helps prioritize remediation efforts based on exploit availability.

In-Depth Metrics Breakdown

Additionally, the Current Status view provides:

  • Vulnerable Items by IP DNS: A detailed list of vulnerable items by their IP DNS, showing the number of vulnerabilities for each system and their respective risk ratings.

  • Vulnerabilities by Product: A breakdown of vulnerabilities by product, helping you understand which products pose the highest security risk.

  • Exploitable Vulnerabilities: A detailed view of vulnerabilities that have known exploits, categorized by their risk rating.


Get Help

If you need more help, contact your Customer Success Manager, reach out to our Service Desk support, or type your question in the chat to our support team. They will be ready to assist you.

Did this answer your question?