USM Central includes the option of searching items of interest on the page. There are several filters displayed by default. You can either filter your search or enter what you are looking for in the search field.
You can see the filters displayed in the main Vulnerabilities page in the following table.
Filter vulnerabilities triggered in the last hour, last 24 hours, last 7 days, last 30 days or last 90 days. You can also configure your own period of time by clicking the icon. This option enables you to customize a range and narrow it to delimit your search per minutes and seconds.
|Active/Inactive||Filter vulnerabilities by the active or inactive vulnerabilities.|
|Deployment||Filter vulnerabilities by the name of the deployment on which the vulnerability has been detected.|
Filter vulnerabilities by the labels applied to the vulnerability A known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security.. See Labels on Vulnerabilities for more information.
|Vulnerability Name||Filter vulnerabilities by the name of the vulnerability.|
|Severity||Filter vulnerabilities by the severity of the vulnerability. Values are High, Medium, and Low. See About Vulnerability Severity for more information.|
|Asset||Filter vulnerabilities of the asset An IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. that is vulnerable.|
The displayed number close to each filter between brackets indicates the number of items that matches the filter. You can also use the filter controls to provide a method of organizing your search and filtered results. The icons below each filter consist of the following:
|Toggle the ability to select multiple values as an OR statement|
|You can view and toggle between the currently filtered item, and other filtered items. You do not have to reset the search|
|Toggle values with (0) matches|
|Sort the information alphabetically|
|Sort the filters by number of items that matches them|
|Reset||Resets to the default values|
Across the top, you can see any filters you have applied. Remove filters by clicking theicon next to the filter. Or clear all filters by clicking the Reset All Filters link.
Note: When applying filters, the search uses the logical AND operator if the used filters are different. However, when the filter is of the same type, the search uses the logical OR.
Those filters that have more than ten options include a Filter Value search field for writing text and making the search easier.
To search vulnerabilities using a filter
- Go to Vulnerabilities.
- Click a filter.
The result of your search displays with vulnerabilities identified.
Searching Vulnerabilities by Using the Search Field
- Go to
- Enter your query in the search field.
- Click the icon .
If you want to search for an exact phrase having two or more words, you need to put quotation marks around the words in the phrase. This includes email addresses (for example, "firstname.lastname@example.org").
Note: Keep in mind that wildcard characters are considered as literals.