This page walks you through accessing Unified VRM Infrastructure Vulnerabilities section to review possible security risks for your organization's IT resources.
Before you begin
To view vulnerability data, you must ingest findings into the platform. See Using Integrate for more information.
Accessing findings inventory
- Go to Unified VRM Infrastructure Vulnerabilities.
GO TO UNIFIED VRM INFRASTRUCTURE VULNERABILITIES
- On the Navigation Tabs, click the Infrastructure Vulnerabilities tab.
You are now viewing the Infrastructure Vulnerabilities inventory detailed list view.
Infrastructure Vulnerabilities enables you to view potential security risks for your organization.
By default, vulnerabilities are displayed by asset group. They can also be viewed by asset, vulnerability, or vuln instance.
View by Asset Group
To view vulnerabilities by assets in an asset group, select the asset group you want to review. All of the findings of that type are displayed in the findings table.
Viewing by Vulnerability
By default, findings are displayed in specific categories like cross-site scripting (XSS) and OpenSSL 'Heartbleed' vulnerability.
View finding details
To view detailed information about a specific finding, click VIEW DETAILS in the VULN GROUP NAME column.