Documentation Center
AlienVault® USM Anywhere™

Labeling the Vulnerabilities

  Role Availability   Read-Only   Analyst   Manager

USM Anywhere includes a set of labels, which you can use to classify your vulnerabilities, track their status, and search vulnerabilities using them as a filter. For more information on how to search vulnerabilities, see Searching Vulnerabilities.

You can not edit or delete the set of default labels:

USM Anywhere allows you to create, edit, and delete your own labels. You can apply a label to one or more vulnerabilities. You can also apply multiple labels to the same vulnerabilityA known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security..

To create a new label

  1. Navigate to ENVIRONMENT > VULNERABILITIES.
  2. Select a vulnerability.
  3. Click Apply Labels.
  4. Click Create New Label.
  5. Type a name for the label.
  6. Select a color for identifying the label.
  7. Click Save.

To edit a label

  1. Navigate to ENVIRONMENT > VULNERABILITIES.
  2. Select a vulnerability.
  3. Click Apply Labels.
  4. Click Manage Labels.
  5. Click the Edit icon () of the label you want to modify.
  6. Modify the name of the label or its color.
  7. Click the Update icon ().

To delete a label

  1. Navigate to ENVIRONMENT > VULNERABILITIES.
  2. Select a vulnerability.
  3. Click Apply Labels.
  4. Click Manage Labels.
  5. Click the Delete icon () of the label you want to delete.
  6. Click Accept to confirm the deletion.

To label vulnerabilities

  1. Navigate to ENVIRONMENT > VULNERABILITIES.
  2. Search for the vulnerability or vulnerabilities you want to apply a label, and select them. See Searching Vulnerabilities.
  3. Click Apply Labels.
  4. Select the label(s) you want to apply.
  5. Click Apply.

Note: You can also label a vulnerability from the Labels column of the vulnerability list view by clicking the Label icon ().

Note: Use the Labels filter to search vulnerabilities related to a label. See Searching Vulnerabilities.