USM Anywhere™

Applying Actions to Vulnerabilities

Role Availability Read-Only Analyst   Manager

USM Anywhere enables you to respond to the vulnerability A known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security.. Use this button to launch an authenticated scan Authenticated scans are performed from inside the machine using a user account with appropriate privileges. of an asset An IP-addressable host, including but not limited to network devices, virtual servers, and physical servers.. You need to select the sensor Sensors are deployed into an on-premises, cloud, or multi-cloud environment to collect log and other security-related data. This data is normalized and then securely forwarded to USM Anywhere for analysis and correlation., if you have more than one installed in your environment, and then indicate the asset to scan.

To apply an action to a vulnerability

  1. Go to Environment > Vulnerabilities.
  2. Search for the vulnerability for which you want to launch an authenticated scan.
  3. Click the vulnerability and a new window opens with the information about the specific vulnerability.
  4. Click Select Action.

    Select an action of a vulnerability

  5. Select the USM Anywhere Sensor in case you have more than one installed in your environment.
  6. In the Asset field, search for the assets to scan. You can enter the IP address or browse assets.
  7. Click Run.