USM Central provides a centralized view of all vulnerabilities detected in your connected deployments. The vulnerabilities main page lists vulnerabilities in reverse chronological order (the most recent item is displayed first).
The vulnerabilities page displays information on vulnerabilities. On the left you can find the search and filters options. Use filters to delimit your search; see Searching Vulnerabilities for further information. Across the top, you can see any filters you have applied. The main part of the page is the actual list of vulnerabilities. Each row describes an individual vulnerability.
|Column / Field Name||Description|
|Last Seen||Last date on which the vulnerability was seen in the assetAn IP-addressable host, including but not limited to network devices, virtual servers, and physical servers.. The displayed date depends on your computer's time zone|
|Vulnerability ID||Displays the associated CVEThe CVE system provides a method, using CVE IDs, to reference publicly known information security vulnerability and exposures in publicly released software packages and environments. ID, in case of having it|
|Vulnerability Name||Displays the name of the vulnerability|
|Deployment||Name of the deployment on which the vulnerability has been detected|
|Labels||Label(s) applied to the vulnerability|
|Asset||This is the asset that is vulnerable. Click the Ellipsis icon () to go to the full details of the asset in the specific deployment|
|Severity||Indicates the severity of the vulnerability. Values are High, Medium, and Low.|
|Score||Common Vulnerability Scoring System (CVSS), see Common Vulnerability Scoring System SIG|
|First Seen||Date of the detection of the vulnerability in the asset. The displayed date depends on your computer's time zone|
Click the Export as Report Icon () to export vulnerabilities. See Exporting Vulnerabilities for further information.
Click the star symbol to the left of an item to mark it as a bookmark for quick access. Clicking the icon on the secondary menu shows the bookmarked items and a link to them.
You can also sort items by selecting 20, 50, or 100 below the result table.
From the list of vulnerabilities, you can click on any individual vulnerability row to display more information on the selected vulnerability, including individual asset(s) that are vulnerable. See Viewing Vulnerabilities Details for further details.