Risks data
Risks data includes security risks that Arctic Wolf detected using one or more of these vulnerability and configuration scans:
- IVA scans
- EVA scans
- Arctic Wolf Agent host-based vulnerability scans
- Cloud Security Posture Management (CSPM) scans
Arctic Wolf retains this data for the last 12 months.
The Risks table includes this information:
- This table does not contain data gathered from account takeover scans. For a list of account takeover data, see Account Takeover data.
- The City, Country, and Scan ID fields do not populate in this table.
|
Column |
Description |
|---|---|
|
Age |
The age of a vulnerability in days. |
|
Asset Category |
The type of asset that the risk was detected on.
Note:
This only populates for risks discovered by an IVA scan. |
|
Asset Criticality |
A label that helps you prioritize risks based on how critical an asset is to your infrastructure. Possible values are:
Tip:
See Edit asset criticality for more information. |
|
Asset Name |
The name or IP address of the asset that the risk was detected on. |
|
Asset Tags |
A set of labels that you apply to an asset to assist with risk mitigation planning. An asset can have more than one tag. A tag can be a custom value or one of these preset options:
Tip:
To change this field value, see Edit asset tags. |
|
Attack Vector |
The relative location where the risk originated from. Possible values are Adjacent, Local, or Network.
Note:
This only populates for risks discovered by an IVA scan. |
|
Customer |
Your customer ID. |
|
Customer UUID |
Your unique identifier. |
|
CVE |
The CVE identifiers of associated risks. |
|
Deployment ID |
The ID of the Arctic Wolf appliance that detected this. |
|
Date |
The date that this entry was generated. |
|
Device ID |
The identifier of the asset that the risk was detected on. |
|
First Detected Date |
The date when the risk was first detected. |
|
First Identified |
Whether this was the first time this was the risk was detected. Possible values are true or false. |
|
Found By |
The category of scan type used to find the risk. This does not populate with Agent scans. Possible values are openvas, webserver, **cloudscan\ aws* , * cloudscan\ azure* , or * cloudscan\ gcp**. |
|
IP Address |
The IP address of the asset containing the risk. |
|
Issue Description |
A description of the identified risk. |
|
Issue Family |
The associative group of the issue name.
Note:
This only populates for risks discovered by an IVA scan. |
|
Issue Name |
The name of the risk. |
|
Latitude |
The longitude of the asset that the risk was detected on. This is derived from the IP address of the asset. |
|
Longitude |
The latitude of the asset that the risk was detected on. This is derived from the IP address of the asset. |
|
Resolution Date |
The date when the risk was resolved. |
|
Risk Score |
The risk score at the time that this risk was detected.
Tip:
See View risk metrics for more information. |
|
Scan Type |
The type of scans Arctic Wolf performs from outside the network, inside the network, and on a device with the Arctic Wolf Agent installed. Possible values are eva, iva, or agent. |
|
Source |
The origin of the scan. Possible values are agent, sensor, or reach. |
|
State |
The state of the risk. Possible values are Open, Acknowledged, In-Planning, Mitigation/Fix in Progress, Mitigated, Unsuccessful Validation, False Positive, or Accepted.
Tip:
See Risk states for more information. |
|
Status |
The status of the scan. Possible values are Active, Inactive, or Obsolete.
Note:
The Mitigated status is not supported in Analytics. See Risk statuses for more information. |
|
Threat |
The severity of the threat. Possible values are Low, Medium, or High.
Note:
The severity might not be the same value that is displayed in the Risk Dashboard. Risks in the Risk Dashboard can also have a value of Critical. |