Searching Vulnerabilities

Role Availability Read-Only Investigator Analyst Manager

USM Anywhere includes the option of searching items of interest on the page. There are several filters displayed by default. You can either filter your search or enter what you are looking for in the search field.

The following table lists the filters you see on the page.

Filters Displayed by Default in the Main Vulnerabilities Page
Filter Name Meaning
Last 24 Hours Filter vulnerabilities triggered in the last hour, last 24 hours, last 7 days, last 30 days, or last 90 days. You can also configure your own period of time by clicking the Custom Range option. This option enables you to customize a range. When you click Custom Range, a calendar opens. You can choose the first and last day to delimit your search by clicking the days on the calendar or entering the days directly. Then select the hours, minutes, and seconds by clicking the specific box. Finally, select AM or PM.
Active/Inactive Filter vulnerabilities by the active or inactive vulnerabilities. See About Active and Inactive Vulnerabilities.
Labels Filter vulnerabilities by the labels applied to the vulnerability A known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security.. See Labeling the Vulnerabilities for more information.
Suppressed Filter vulnerabilities by whether they are marked as suppressed. See Viewing Vulnerabilities Details for more information.
Vulnerability Name Filter vulnerabilities by name of the vulnerability.
Severity Filter vulnerabilities by severity of the vulnerability. Values are High, Medium, and Low. See About Vulnerability Severity.
Source Filter vulnerabilities by the source that found the vulnerability.
Asset Filter vulnerabilities of the asset An IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. that is vulnerable.
Asset Groups This is the asset group Asset groups are administratively created objects that group similar assets for specific purposes. that has vulnerable asset. The number between parentheses indicates the number of assets in the asset group.

The number between brackets displayed by each filter indicates the number of items that matches the filter. You can also use the filter controls to provide a method of organizing your search and filtered results.

The following table shows the icons displayed with each filter box.

Icons Next to the Filter Title
Icon Meaning
Sort the filters alphabetically.
Sort the filters by number of items that matches them.

In the upper-left side of the page, you can see any filters you have applied. Remove filters by clicking theicon next to the filter. Or clear all filters by clicking Reset.

Selected Filters on the Vulnerabilities Main Page

Note: When applying filters, the search uses the logical AND operator if the used filters are different. However, when the filter is of the same type, the search uses the logical OR operator.

Those filters that have more than 10 options include a Filter Values search field for writing text and making the search easier. If there are more than 50 search results, a icon appears to the right of the Filter Values search field. Click this icon to download a CSV containing up to 1024 results.

Filter Value Search Field

To search for Vulnerabilities using the search field

  1. Go to Environment > Vulnerabilities.
  2. Enter your query in the search field.
  3. If you want to search for an exact phrase having two or more words, you need to put quotation marks around the words in the phrase. This includes email addresses (for example, "bob@mycompany.com").

    Note: Wildcard characters are considered as literal characters.

  4. Click the icon.

Vulnerabilities Search Field

The result of your search displays with the items identified.