Asset focus
This area lists all zones, products, and assets from the inventory for which at least one vulnerability is known. Assets that are free of vulnerabilities are not displayed.
You can display all vulnerabilities of the selected asset and define appropriate tasks.
Zone overview
This area lists the zones affected by vulnerabilities ② and shows how they are affected ⑤. Clicking on a zone opens the 'Assets list'.
You can filter zones ① or adjust the sorting of zones ③.
Additional information is provided for each zone (④-⑦).
Number | Description |
---|---|
① | Input field for filtering the zones |
② | List of zones |
③ | Sort button |
Number | Description |
---|---|
④ | Zone name |
⑤ | Distribution of the individual risk levels over all of the affected assets; see color bar for risk level. |
⑥ | Number of assets in this zone affected by at least one vulnerability. |
⑦ | Ratio between [the total number of assets in this zone] and [the number of affected assets in this zone]; at '100%', every asset contained in the zone is affected by at least one vulnerability. |
Asset list for zones
This area shows information about the selected zone as well as all products and assets in the inventory that are part of the zone and affected by at least one vulnerability.
Clicking the button ① takes you back to the 'Zone overview'.
The zone details ② show important information about the zone.
The list of products ③ shows products that contain at least one asset that is in the zone and is affected by a vulnerability. Clicking on it displays all affected assets ④. Details can be displayed for a selected asset ⑥.
After you select an asset and then navigate to the 'Threats and tasks' area ⑥, all vulnerabilities of the selected asset can be viewed and appropriate tasks can be defined. For each affected asset, the greatest risk level due to the currently pending vulnerabilities ⑦ is shown. It also shows how many of these pending vulnerabilities are still in the 'Open' status, and what the highest risk level of the open vulnerabilities is ⑩.
Number | Description |
---|---|
① | Name of the selected zone and navigation back to the 'Zone overview' |
② | Zone details display important information about the zone |
③ | List of products affected by vulnerabilities |
④ | Highest risk level of the assets of the respective product |
⑤ | Button to switch to 'Threats and tasks' |
⑥ | Display of asset details |
Number | Description |
---|---|
⑦ | Highest risk level due to an unfixed vulnerability on this asset |
⑧ | Asset name |
⑨ | IP address of the asset |
⑩ | Number and highest risk level of 'Open Threats' |
Asset overview
Assets-tab ② in Asset focus shows all the vulnerable assets regardless of zone assignment. This view allows quick search for the specific asset.
Number | Description |
---|---|
① | Zones-tab displays asset risk information grouped by zone |
② | Assets-tab displays all the assets affected by vulnerabilities in the system |
Threats and tasks
This area shows threats that affect the selected asset ①, as well as recommended or scheduled tasks and, if applicable, asset details ③.
The list of threats ② shows which different threats threaten the security of the asset.
The risk level ⑧ shows how high the risk to the asset is from this threat. The detection date ⑫ indicates when the system first received information about the threats. Vulnerabilities that have already been managed can be hidden ④.
Details of the selected vulnerability ⑤ can be displayed, see 'Threat details'.
When you select an asset, the recommendations and tasks ⑥ are displayed and offered for selection. Changes to the tasks are applied immediately.
Clicking the 'Close' button ⑦ takes you back to the 'Asset list'.
Number | Description |
---|---|
① | Information about the asset (name, zone, IP address, installed firmware version) |
② | List of asset vulnerabilities |
③ | 'Asset details' button |
④ | 'Hide managed' button |
⑤ | 'Threat details' button |
⑥ | List of recommendations and tasks; see 'Task definition' |
⑦ | 'Close' button |
Number | Description |
---|---|
⑧ | Risk level of this vulnerability for this asset |
⑨ | Title of the vulnerability |
⑩ | Organization that disclosed the vulnerability (ID) |
⑪ | Brief description of the vulnerability |
⑫ | Date of detection of the vulnerability for this asset |
⑬ | Status of the vulnerability |