Vulnerability Response correlation

Vulnerability Response data correlation is performed using groups, calculators, and libraries.

You can do the following:
  • View ungrouped vulnerable items
  • Assign prioritization, rules, and access.
  • View vulnerability group rules based on vulnerabilities, filters, filter conditions, and group keys.
  • Manage vulnerable items and vulnerabilities