AlienVault® USM Central™

Vulnerabilities List View

USM Central provides a centralized view of all vulnerabilities detected in your connected deployments. The vulnerabilities main page lists vulnerabilities in reverse chronological order (the most recent item is displayed first).

The vulnerabilities page displays information on vulnerabilities. On the left you can find the search and filters options. Use filters to delimit your search; see Searching Vulnerabilities for further information. Across the top, you can see any filters you have applied. The main part of the page is the actual list of vulnerabilities. Each row describes an individual vulnerability.

List of the default columns in Vulnerabilities
Column / Field Name Description
Last Seen Last date on which the vulnerability was seen in the assetAn IP-addressable host, including but not limited to network devices, virtual servers, and physical servers.. The displayed date depends on your computer's time zone
Vulnerability ID Displays the associated CVEThe CVE system provides a method, using CVE IDs, to reference publicly known information security vulnerability and exposures in publicly released software packages and environments. ID, in case of having it
Vulnerability Name Displays the name of the vulnerability
Deployment Name of the deployment on which the vulnerability has been detected
Labels Label(s) applied to the vulnerability
Asset This is the asset that is vulnerable. Click the Ellipsis icon () to go to the full details of the asset in the specific deployment
Severity Indicates the severity of the vulnerability. Values are High, Medium, and Low.
Score Common Vulnerability Scoring System (CVSS), see Common Vulnerability Scoring System SIG
First Seen Date of the detection of the vulnerability in the asset. The displayed date depends on your computer's time zone

Click the Export as Report Icon () to export vulnerabilities. See Create Vulnerabilities Report for further information.

Click the icon to bookmark an item for quick access. Clicking the icon on the secondary menu shows the bookmarked items and provides links to them.

You can also sort items by selecting 20, 50, or 100 below the result table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.

From the list of vulnerabilities, you can click on any individual vulnerability row to display more information on the selected vulnerability, including individual asset(s) that are vulnerable. See Viewing Vulnerabilities Details for further details.