- Knowledge base
- Getting started
- Vulnerability manager
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I get started with Vulnerability Manager?
Vulnerability Manager is a great tool to understand your discovered vulnerabilities and their potential impact on your environment. It can be used in many ways; this article will cover the most important areas to know when working with Vulnerability Manager.
This article presumes that you already have some scan results with active vulnerabilities.
If not, read our getting started guides for setting up scans.
System & Network Scanning
https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-network-scan
Web Application Scanning and API Scanning
https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-web-application-scan
Phishing & Awareness Training
How do I get started with phishing simulation and awareness training?
Cloud Scanning coming in 2024
Support for vulnerabilities found using our cloud scanner (CSPM) will be added in 2024.
Reviewing detection information
To understand how a vulnerability was found, follow the steps in this article.
Prioritize and structure vulnerabilities
Maintaining a well-organized structure is crucial when dealing with vulnerability management. Discover the various features available and simplify the process.
https://support.holmsecurity.com/knowledge/how-do-i-prioritize-and-structure-vulnerabilities
Apply filters
Use filters to find the information you are looking for.
https://support.holmsecurity.com/knowledge/how-do-i-apply-a-filter-for-a-view
Create views
Save views based on filters you are going to be frequently looking at.
https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-view
Ignoring vulnerabilities
In some situations, you may encounter vulnerabilities that are unnecessary to display in your working views. To address this, you can utilize the methods outlined in this article to change the status of an active vulnerability. This change will automatically filter it from your view, ensuring only relevant vulnerabilities are visible.
https://support.holmsecurity.com/knowledge/how-do-i-ignore-or-disable-vulnerabilities