Updated on 2024-06-07 GMT+08:00

Viewing Vulnerability Details

Scenario

This topic describes where to view details about Linux, Windows, Web-CMS, and application vulnerabilities.

Prerequisites

  • You have purchased the SecMaster professional edition and the edition is within the validity period.
  • HSS logs have been connected to SecMaster and the function of automatically converting logs into alerts has been enabled. For details, see Data Integration.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the page and choose Security & Compliance > SecMaster.
  3. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.

    Figure 1 Workspace management page

  4. In the navigation pane on the left, choose Risk Prevention > Vulnerabilities.

    Figure 2 Accessing the vulnerability management page

  5. View vulnerability information on the Vulnerabilities page.

    Table 1 Viewing vulnerability information

    Parameter

    Description

    Vulnerability Type Distribution

    This graph displays the total number of vulnerabilities and the distribution of vulnerabilities by type.

    Top 5 Vulnerabilities

    • The Top 5 Vulnerabilities area lists the five vulnerabilities with the most affected assets. The more affected assets, the higher the vulnerability ranking is.
    • The Vulnerability ID tab displays the IDs and the affected asset quantity for the five vulnerabilities.
    • The Vulnerability Type tab displays the names, severity levels, and affected asset quantity for the five vulnerabilities.

    Top 5 Vulnerable Resources

    This graph displays the five resources with the most vulnerabilities.

    Vulnerability List

    • The vulnerable list area includes Linux Vulnerabilities, Windows Vulnerabilities, Web-CMS Vulnerabilities, and Application Vulnerabilities tabs. Table 2 lists parameters for these vulnerability tabs.
    • To quickly search for a specific vulnerability, use filters in your search. Specifically, you can specify the vulnerability name, vulnerability ID, severity, and handling status, enter a keyword in the search box, and click .
    • To view details about a vulnerability, click the vulnerability name and view the details on the page displayed on the right.
    • You can view the total number of vulnerabilities below the vulnerability list. You can view a maximum of 10,000 vulnerability records page by page. To view more than 10,000 records, optimize the filter criteria.
    Table 2 Vulnerability parameters

    Parameter

    Description

    Vulnerability Name

    Name of the scanned vulnerability.

    Click a vulnerability name to view vulnerability description and vulnerability library information.

    Severity

    Severity level of the vulnerability.

    ID

    ID of the vulnerability.

    Affected Assets

    Total number of assets affected by a vulnerability

    Vulnerability ID

    ID of a vulnerability.

    Last Scanned

    Time of the last scan

    Handled

    This column specifies whether the vulnerability has been handled.