USM Central includes several filters displayed by default. These filters enable you to search for your items of interest. You can either filter your search, or enter what you are looking for in the search field, which is in the lower-left corner of the page.
Using Filters to Search for Vulnerabilities
USM Central allows you to configure more filters and change which filters are displayed by clicking the Filter Configuration icon ().
|Created during||Filter vulnerabilities triggered in the last hour, last 24 hours, last 7 days, or last 30 days. You can also configure your own period of time by clicking the Custom Range icon ()|
|Active/Inactive||Filter vulnerabilities by the active or inactive vulnerabilities.|
|Deployment||Filter vulnerabilities by the name of the deployment on which the vulnerability has been detected|
|Labels||Filter vulnerabilities by the applied label|
|Vulnerability Name||Filter vulnerabilities by the name of the vulnerability|
|Severity||Filter vulnerabilities by the severity of the vulnerability. Values are High, Medium, and Low, see About Vulnerability Severity|
|Asset||Filter vulnerabilities by the asset that is vulnerable|
The displayed number close to each filter between brackets indicates the number of items that matches the filter. You can also use the filter controls to provide a method of organizing your search and filtered results. The icons below each filter consist of the following
|Toggle the ability to select multiple values as an OR statement|
|You can view and toggle between the currently filtered item, and other filtered items. You do not have to reset the search|
|Toggle values with (0) matches|
|Sort the information alphabetically|
|Sort the filters by number of items that matches them|
|Reset||Resets to the default values|
Across the top, you can see any filters you have applied. Remove filters by clicking the Close icon () next to the filter. Or clear all filters by clicking the Clear All Filters link.
Note: When applying filters, the search uses the logical AND operator if the used filters are different. However, when the filter is of the same type, the search uses the logical OR.
To search vulnerabilities using a filter
- Go to VULNERABILITIES.
- Click on a filter.
The result of your search displays with vulnerabilities identified.
Searching Vulnerabilities by Using the Search Field
- Go to
- Enter your query in the search field.
- Click the icon.
If you want to search for an exact phrase having two or more words, you need to put quotation marks around the words in the phrase. This includes email addresses (for example, "firstname.lastname@example.org").
Note: Keep in mind that wildcard characters are considered as literals.
The result of your search displays with the items identified.