First, under Client Management navigate to Vulnerability Management:
In the right pane the ACMP Vulnerability Management dashboard will be displayed.
The dashboard is divided into 4 sections. In this area, you get an initial overview of All clients grouped by severity, Clients with most vulnerabilities, Vulnerabilities affecting most Clients and Vulnerabilities with highest score.
All clients are displayed that are managed using ACMP here. The chart shows the number of clients that match the severity. Click Show details in query to open a grouped query from which you can retrieve the client details and view the individual vulnerabilities found. |
The clients with the most identified vulnerabilities will be displayed here. You can access the client details from this view by clicking on the computer name. In addition, you can click Show details in query to open a query in which all clients are displayed. Again, you have direct access to the client details from here. |
The 10 most common vulnerabilities are listed dynamically here. If you want to group the results by the displayed column names (CVE ID, Title, CVSS-Score, Affected Clients), click on it with the left mouse button and drag it to the dark gray line above the list and release the mouse button. To view all weaknesses, click on Show details in query. |
Among the tab Detected vulnerabilities and a list of all found vulnerabilities in your network is displayed. In the overview, the CVE ID, the title, the severity, the CVSS score, the number of clients affected, the affected products and possibly the container path will always be displayed. You can group the query by each of the columns by dragging the column header to the top line.
On the ribbon bar, you have the following options for detected vulnerabilities:
Refresh Refresh the current view. |
|
Exclude Globally excludes detected vulnerabilities. This vulnerability is no longer listed among the detected vulnerabilities here. |
|
Exclude vulnerability locally Excludes the selected detected local vulnerabilities. A dialog will open for selecting a query and then the client or those to be excluded. |
|
Create container Creates a container for selected detected vulnerabilities. |
You can specify globally excluded weaknesses by clicking on Remove exclusion (). If you remove the exclusion, this vulnerability will be listed Detected Vulnerabilities.
You can specify locally excluded vulnerabilities by clicking on Remove exclusion (). In the ribbon bar, you can update the current view or remove the exclusion for the selected locally excluded vulnerabilities. . If you remove the exclusion, this vulnerability will be listed in Discovered Vulnerabilities. If a locally excluded vulnerability on another client is found on your network, then it will be listed under Discovered vulnerabilities. In this case, the number of affected clients is reduced to the number for which you have excluded the vulnerability locally.
Note: |
For each vulnerability, there are individual details. This will be displayed below the listings on the Detected vulnerabilities, Globally excluded vulnerabilities and Locally excluded vulnerabilities. |
Last change on 03.04.2017