USM Central™

Searching Vulnerabilities

USM Central includes several filters displayed by default. These filters enable you to search for your items of interest. You can either filter your search, or enter what you are looking for in the search field, which is in the lower-left corner of the page.

You can see the filters displayed in the main Vulnerabilities page in the following table.

Filters Displayed in the Main Vulnerabilities Page
Filter Name Meaning
Created during

Filter vulnerabilities triggered in the last hour, last 24 hours, last 7 days, last 30 days or last 90 days. You can also configure your own period of time by clicking the icon. This option enables you to customize a range and narrow it to delimit your search per minutes and seconds.

Active/Inactive Filter vulnerabilities by the active or inactive vulnerabilities.
Deployment Filter vulnerabilities by the name of the deployment on which the vulnerability has been detected.
Labels

Filter vulnerabilities by the labels applied to the vulnerabilityA known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security.. See Labels on Vulnerabilities for more information.

Vulnerability Name Filter vulnerabilities by the name of the vulnerability.
Severity Filter vulnerabilities by the severity of the vulnerability. Values are High, Medium, and Low. See About Vulnerability Severity for more information.
Asset Filter vulnerabilities of the assetAn IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. that is vulnerable.

The displayed number close to each filter between brackets indicates the number of items that matches the filter. You can also use the filter controls to provide a method of organizing your search and filtered results. The icons below each filter consist of the following:

Icons Below Filters
Icon Meaning
Toggle the ability to select multiple values as an OR statement
You can view and toggle between the currently filtered item, and other filtered items. You do not have to reset the search
Toggle values with (0) matches
Sort the information alphabetically
Sort the filters by number of items that matches them
Reset Resets to the default values

Across the top, you can see any filters you have applied. Remove filters by clicking the Close icon () next to the filter. Or clear all filters by clicking the Reset All Filters link.

Reset Filters in the Vulnerabilities main page

Note: When applying filters, the search uses the logical AND operator if the used filters are different. However, when the filter is of the same type, the search uses the logical OR.

Those filters that have more than ten options include a Filter Value search field for writing text and making the search easier.

To search vulnerabilities using a filter

  1. Go to Vulnerabilities.
  2. Click a filter.
  3. The result of your search displays with vulnerabilities identified.

Searching Vulnerabilities by Using the Search Field

To search Vulnerabilities using the search field

  1. Go to Vulnerabilities.
  2. Enter your query in the search field.
  3. If you want to search for an exact phrase having two or more words, you need to put quotation marks around the words in the phrase. This includes email addresses (for example, "bob@mycompany.com").

    Note: Keep in mind that wildcard characters are considered as literals.

  4. Click the icon.