Vulnerabilities Views

Views in Vulnerability Management allows you to view/export vulnerabilities based on the specific conditions provided by you. Conditions can be provided by using a combination of 'Fields', 'Filters' and 'Sort By'. A sample set of conditions can be as follows:

  • In all the vulnerabilities, the following fields should be visible: 'Affected Asset', 'Asset Sensitivity', 'Asset Type', 'Description', 'Severity', 'Status' and 'URL'.
  • Only the vulnerabilities belonging to the 'Web Asset Type' should be retrieved. More about assets here.
  • The retrieved vulnerabilities should be sorted from 'High Severity' to 'Low Severity'.

If you have to create a view for the above mentioned specific conditions, the steps will be as follows:

  1. Select the fields 'Affected Asset', 'Asset Sensitivity', 'Asset Type', 'Description', 'Severity', 'Status' and 'URL'. Click on 'Apply' once you have selected the fields.



  2. Add a filter 'where Asset Type is Web' and click on 'Apply'.


  3. Add a sort to 'SORT BY Severity FROM High-Low' and click on 'Apply'

  4. All the conditions have now been applied and an 'Unsaved View' is created for you. If you want to save these conditions, click on 'Save Current View', give your view a name and if you want to make this view visible to other members of your team toggle the option available.



Apart from being able to create views, Strobes provides you with a few views by default. Those views are as follows:

  • Application Vulnerabilities : All the vulnerabilities related to your web/mobile assets will get retrieved.
  • Network Vulnerabilities : All the vulnerabilities related to your network assets will get retrieved.
  • Cloud Vulnerabilities : All the vulnerabilities related to your cloud assets will get retrieved.
  • Exploitable Vulnerabilities : All the vulnerabilities across all your assets which can be exploited will get retrieved.
  • Highest Prioritized Vulnerabilities : The vulnerabilities which have highest priority will get retrieved.
  • Active and High Priority Vulnerabilities : All the vulnerabilities which are in the 'Active' state and which have high priority will get retrieved.
  • SLA Violated : All the vulnerabilities for which SLA has been violated will get retrieved. More about SLA policy here.
  • Vulnerabilities in Critical Assets : All the vulnerabilities belonging to critical assets will get retrieved.
  • Vulnerabilities Open 90 Days : All the vulnerabilities which have been open for more than 90 days will get retrieved.
  • Patchable Vulnerabilities : All the vulnerabilities which have patches available will get retrieved.


Was this article helpful?
0 out of 0 found this helpful



Article is closed for comments.

Articles in this section

See more