In OneView, use the Vulnerabilities page to view important security information for detected vulnerabilities across your sites and managed endpoints. Vulnerabilities are detected daily across operating systems and software applications, it's important to monitor this page to ensure your environment is protected.
Vulnerability data is stored and displayed for up to 90 days prior across all endpoints. When an endpoint is removed from OneView, its vulnerabilities are removed from the console after 48 hours.
TIP - To see the latest vulnerabilities identified on your endpoints, run or schedule an Inventory & Vulnerability Scan. For more information, see Enable Vulnerability and Patch Management in OneView.
Use Vulnerability and Patch Management to install available software updates and system patches to keep endpoints protected.
To view vulnerabilities, click Monitor > Vulnerabilities. Endpoint vulnerabilities display.
Endpoint information
The following information is displayed for each endpoint vulnerability.
Column | Description |
Application | Detected application name with the vulnerability. |
CISA recommended |
|
CVE |
|
Description | Description of the vulnerability and how it is used to exploit the application. |
Endpoint | Host name of the vulnerable endpoint. |
Identified date | Date the vulnerability was detected on the endpoint. |
OS | Operating system of the endpoint. |
OS type | Type of operating system installed on the endpoint. |
Severity |
Severity level of the detected vulnerability. Severity is set using the CVSS standard. For more information, see CVSS Score System.
|
Site | OneView Site name assigned to the endpoint with the vulnerability. |
Vendor | Vendor name of the installed software which is vulnerable. |
Filter vulnerabilities
The Vulnerabilities table helps you manage the available information pulled from your endpoints. Use filters within this table to sort your vulnerability information into specified results.
Customize data in the results list in the following ways:
- Reset filters: In the upper-right corner of the page, click Reset filters to go back to the default filter settings.
- Add / Remove Columns: In the top-right of the table, click Add / Remove Columns to customize the table columns.
- Column pinning and auto-sizing: Next to a column header, click the filter button to display a checkbox list of different sub-filters you can apply. Click the filter tab to pin or auto size for the selected column.
- Right-click menu: In the table, click and drag to select and highlight a table section. Right-click on your selected information to copy or export a .csv or a .xlsx file.
- Select all: Click the checkbox next to the CVE column header.
Export data
Download your vulnerability information to your local machine for auditing purposes or external reporting.
- Select all or check specific boxes for the rows you want to export.
- At the top-right of the Vulnerabilities page, click the ellipsis icon .
- Click Download .csv or Download .xlsx to export your data.
Return to Vulnerability and Patch Management.