Structure

Navigation:  Client management > Vulnerabilty Management >

Structure

Version 1.0.0

Show hidden text

First, under Client Management navigate to Vulnerability Management:

 

In the right pane the ACMP Vulnerability Management dashboard will be displayed.

 

Dashboard

The dashboard is divided into 4 sections. In this area, you get an initial overview of All clients grouped by severity, Clients with most vulnerabilities, Vulnerabilities affecting most Clients and Vulnerabilities with highest score.

 

hmtoggle_arrow1All clients grouped by severity

All clients are displayed that are managed using ACMP here. The chart shows the number of clients that match the severity. Click Show details in query to open a grouped query from which you can retrieve the client details and view the individual vulnerabilities found.

 

hmtoggle_arrow1Clients with most vulnerabilities

The clients with the most identified vulnerabilities will be displayed here. You can access the client details from this view by clicking on the computer name. In addition, you can click Show details in query to open a query in which all clients are displayed. Again, you have direct access to the client details from here.

 

hmtoggle_arrow1Vulnerabilities affecting most Clients

The 10 most common vulnerabilities are listed dynamically here. If you want to group the results by the displayed column names (CVE ID, Title, CVSS-Score, Affected Clients), click on it with the left mouse button and drag it to the dark gray line above the list and release the mouse button.

To view all weaknesses, click on Show details in query.

 

Detected Vulnerabilities

Among the tab Detected vulnerabilities and a list of all found vulnerabilities in your network is displayed. In the overview, the CVE ID, the title, the severity, the CVSS score, the number of clients affected, the affected products and possibly the container path will always be displayed. You can group the query by each of the columns by dragging the column header to the top line.

 

On the ribbon bar, you have the following options for detected vulnerabilities:

 

Refresh

Refresh

Refresh the current view.

black_list-add2

Exclude

Globally excludes detected vulnerabilities.

This vulnerability is no longer listed among the detected vulnerabilities here.

black_list_computer

Exclude vulnerability locally

Excludes the selected detected local vulnerabilities.

A dialog will open for selecting a query and then the client or those to be excluded.

Container_Add

Create container

Creates a container for selected detected vulnerabilities.

 

Globally excluded vulnerabilities

You can specify globally excluded weaknesses by clicking on Remove exclusion (black_list-remove2). If you remove the exclusion, this vulnerability will be listed Detected Vulnerabilities.

 

Locally excluded vulnerabilities

You can specify locally excluded vulnerabilities by clicking on Remove exclusion (black_list-remove2). In the ribbon bar, you can update the current view or remove the exclusion for the selected locally excluded vulnerabilities. . If you remove the exclusion, this vulnerability will be listed in Discovered Vulnerabilities. If a locally excluded vulnerability on another client is found on your network, then it will be listed under Discovered vulnerabilities. In this case, the number of affected clients is reduced to the number for which you have excluded the vulnerability locally.

 

Hinweis

Note:

For each vulnerability, there are individual details. This will be displayed below the listings on the Detected vulnerabilities, Globally excluded vulnerabilities and Locally excluded vulnerabilities.

Last change on 03.04.2017