Vulnerability manager

How do I get started with Vulnerability Manager?

Vulnerability Manager is a great tool to understand your discovered vulnerabilities and their potential impact on your environment. It can be used in many ways; this article will cover the most important areas to know when working with Vulnerability Manager.

This article presumes that you already have some scan results with active vulnerabilities.
If not, read our getting started guides for setting up scans. 

System & Network Scanning
https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-network-scan

Web Application Scanning and API Scanning
https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-web-application-scan

Phishing & Awareness Training
How do I get started with phishing simulation and awareness training?

Cloud Scanning coming in 2024
Support for vulnerabilities found using our cloud scanner (CSPM) will be added in 2024.

Reviewing detection information

To understand how a vulnerability was found, follow the steps in this article.

https://support.holmsecurity.com/knowledge/how-do-i-review-the-detection-information-for-a-vulnerability-in-vulnerability-manager

Prioritize and structure vulnerabilities

Maintaining a well-organized structure is crucial when dealing with vulnerability management. Discover the various features available and simplify the process.

https://support.holmsecurity.com/knowledge/how-do-i-prioritize-and-structure-vulnerabilities

Apply filters

Use filters to find the information you are looking for.

https://support.holmsecurity.com/knowledge/how-do-i-apply-a-filter-for-a-view

Create views

Save views based on filters you are going to be frequently looking at.

https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-view

Ignoring vulnerabilities

In some situations, you may encounter vulnerabilities that are unnecessary to display in your working views. To address this, you can utilize the methods outlined in this article to change the status of an active vulnerability. This change will automatically filter it from your view, ensuring only relevant vulnerabilities are visible.

https://support.holmsecurity.com/knowledge/how-do-i-ignore-or-disable-vulnerabilities