Categorizing Vulnerabilities by Risk and State 
The Details view within Vulnerability Management provides an exhaustive list and analysis of open vulnerabilities, categorized by risk rating, state, product, and discovery date, helping you thoroughly understand and manage your security posture.
Prerequisites
To use Vulnerability Management in the Arxus Portal you need;
Access to the Arxus portal with the appropriate permissions to use this feature.
Your company must have you activated this service with Arxus.
How to activate?
If your company has this service active, and you still can’t use it, contact your company portal administrator (usually this person, is who in your company has “Full Role” rights to the users and permission section)
Summary Metrics
In the Details view, you will find:
Critical Vulnerabilities: Displays the count of critical vulnerabilities found.
High Vulnerabilities: Shows the number of high-risk vulnerabilities.
Medium Vulnerabilities: Presents the total number of medium-risk vulnerabilities.
Low Vulnerabilities: Indicates the count of low-risk vulnerabilities.
Visual Data Representation
The Details view also includes:
Count of Vulnerable Items by Risk Rating: A bar graph displaying the number of vulnerable items categorized by their risk rating (Critical, High, Medium, Low, None).
Count of Vulnerable Items by State: A visual representation showing the number of vulnerable items categorized by their state (Closed, Open, Deferred).
Count of Vulnerable Items by Product: This section categorizes vulnerabilities by product, helping identify which products are most affected.
Count of Vulnerable Items by First Found Date: A timeline representation of when vulnerabilities were first discovered, providing insights into the historical trend of vulnerabilities.
In-Depth Metrics Breakdown
Additionally, the Details view provides:
Detailed Vulnerability Information: A comprehensive table listing each vulnerability along with its ID, DNS, first found date, closed date, state, and name. This helps you track and manage each vulnerability individually.
Get Help
If you need more help, contact your Customer Success Manager, reach out to our Service Desk support, or type your question in the chat to our support team. They will be ready to assist you.
