Vulnerability Response

The Vulnerability Response Explorer provides a graphical view into vulnerable item activity, allowing an administrator or analyst to quickly pinpoint areas of concern.

The Vulnerability Response Explorer homepage displays vulnerability information that is tailored to the role of the user.

Note: When the Vulnerability Analytics plugin is activated, you can can use Interactive filters on the dashboard version. See Vulnerability Explorer dashboard.
You can point to any part of a chart (bar, pie, data point, heatmap, and so on) to view general data specific to that part. If you click any part of a report, a list opens to provide detailed information.
Vulnerability Response Explorer homepage

Vulnerability Explorer homepage

Table 1. Vulnerability Explorer homepage reports
Name Visual Description
Vulnerabilities Single Score Total number of vulnerabilities that match the areas shown.
Vulnerability by CWE Bar chart The number of vulnerable items from the Common Weakness Enumerations (CWE) list.
Exploitation Complexity over Attack Vector Heatmap The number of vulnerable items per access complexity and access vector.
Vulnerable States vs Business Service Criticality Bar chart The number of vulnerable items within each state for each criticality issue.
Vulnerability Map Map Vulnerable item data by geographical location. The world map is highlighted in every area in which a vulnerability occurs. A map allows you to drill down to vulnerable item information by location.

Vulnerability Explorer dashboard

The Vulnerability Explorer dashboard displays the same security incident information as the homepage. You can point to any part of a chart (bar, pie, data point, heatmap, and so on) to view general data specific to that part. Interactive filters allow you to customize your view. If you click any part of a report, a list opens to provide detailed information.

Vulnerablity Explorer dashboard
Table 2. Vulnerability Explorer filters
Name Visual Description
These filters are only available when the Security Incident Analytics plugin is activated.
CVE Identifier Drop down menu Provides real-time filtering based on CVE Identifier.
Vulnerability Active Radio button Provides real-time filtering based on whether the vulnerability is active.
Vulnerability Business Impact Check box Provides real-time filtering based on business impact.