Skip to main content

Vulnerability Management - Details

Discover how the Details view helps you categorize vulnerabilities and gain in-depth insights to strengthen your security.

Updated over a year ago

Categorizing Vulnerabilities by Risk and State

The Details view within Vulnerability Management provides an exhaustive list and analysis of open vulnerabilities, categorized by risk rating, state, product, and discovery date, helping you thoroughly understand and manage your security posture.


Prerequisites

To use Vulnerability Management in the Arxus Portal you need;

  • Access to the Arxus portal with the appropriate permissions to use this feature.

  • Your company must have you activated this service with Arxus.

How to activate?

If your company has this service active, and you still can’t use it, contact your company portal administrator (usually this person, is who in your company has “Full Role” rights to the users and permission section)


Summary Metrics

In the Details view, you will find:

  • Critical Vulnerabilities: Displays the count of critical vulnerabilities found.

  • High Vulnerabilities: Shows the number of high-risk vulnerabilities.

  • Medium Vulnerabilities: Presents the total number of medium-risk vulnerabilities.

  • Low Vulnerabilities: Indicates the count of low-risk vulnerabilities.

Visual Data Representation

The Details view also includes:

  • Count of Vulnerable Items by Risk Rating: A bar graph displaying the number of vulnerable items categorized by their risk rating (Critical, High, Medium, Low, None).

  • Count of Vulnerable Items by State: A visual representation showing the number of vulnerable items categorized by their state (Closed, Open, Deferred).

  • Count of Vulnerable Items by Product: This section categorizes vulnerabilities by product, helping identify which products are most affected.

  • Count of Vulnerable Items by First Found Date: A timeline representation of when vulnerabilities were first discovered, providing insights into the historical trend of vulnerabilities.

In-Depth Metrics Breakdown

Additionally, the Details view provides:

  • Detailed Vulnerability Information: A comprehensive table listing each vulnerability along with its ID, DNS, first found date, closed date, state, and name. This helps you track and manage each vulnerability individually.


Get Help

If you need more help, contact your Customer Success Manager, reach out to our Service Desk support, or type your question in the chat to our support team. They will be ready to assist you.

Did this answer your question?