- Knowledge base
- Vulnerability Manager
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
System & Network Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability Manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS ASV scans
-
Partner Portal
-
Terms & conditions
-
Dashboard
What are the different filtration options for unified vulnerabilities?
Here is the meaning of the filters for the Unified vulnerabilities view:
Vulnerabilities
- Threat: This filter helps you choose the level of the threat score.
- Severity: This filter enables you to select the severity of the detected vulnerabilities.
- EPSS: This filter allows you to choose the level of the Exploit Prediction Scoring System.
- Status: This filter will enable you to select the status of the detected vulnerabilities.
- CVE ID: This filter allows you to search for a specific vulnerability CVE ID.
- HID: This filter allows you to search for a specific vulnerability test HID
- Vulnerabilities: This filter helps to select between potential and general vulnerabilities.
- Used in known ransomware: This button will help you find the vulnerabilities used in known exploits.
- Ignored & Disabled vulnerabilities: This filter will help you see the ignored or disabled vulnerabilities.
- Reason: This filter will help you determine the reasons for the ignored vulnerabilities.
- Show only expiring: Enabling this filter will show the ignored vulnerabilities with an expiration date.
Asset
- Asset type: This filter allows you to choose between the different asset types.
- Asset: This filter helps you search for a specific asset by typing its name, such as its IP address, web app URL, or Device Agent name.
- Operating System: This filter helps you type in the Operating system to find a specific asset more easily.
- Include and exclude assets with the tags below: This filter will help you use the tag system to include or exclude assets.
Date
- First detected: This filter will help you search for the date a vulnerability was first detected during a scan.
- Last detected: This filter will help you search for the date a vulnerability was last detected during a scan.