Risks and Unassigned Risks sections
On the Risks page, the Risks section displays a table with details about each risk that was identified in the network. On the Management Plan page, the Unassigned Risks section displays a table with risks that are not currently assigned to a plan. Both tables have the same columns.
To change how information is organized in the table, do any of these actions:
- To set the number of rows that appear on a page, in the Show x Entries list, select a value.
- To add or remove table columns, click Columns, and then select the checkboxes of the columns you want to display.
- To sort data by a specific column, click the column heading.
- To configure the risks that display in the table, change the filters.
For more information, see Filter target groups by tags and Filters section.
Both tables display this information:
|
Column |
Description |
|---|---|
|
Checkbox |
Enables you to select or clear the checkboxes of all risks currently displayed on the page. For example, if you have a total of 832 risks, when you select 100 in the Show Entries list, 100 risks are selected after you select this checkbox. |
|
Source |
The source that discovered the risk. For example, a scan or Arctic Wolf Agent. |
|
Host |
The host where the risk was discovered. |
|
Issue |
The risk title or issue name. |
|
Risk Score |
The risk rating. The higher the risk score, the more severe the risk. |
|
Asset Criticality |
The criticality value of the asset where the risk was discovered. For more information, see Edit asset criticality. |
|
OS |
The operating system (OS) of the asset where the vulnerability was discovered. |
|
Asset Category |
The category of the asset where the risk was discovered. |
|
Action |
The action that is required to mitigate the risk. Possible values are:
|
|
State |
The state of the risk. Possible values are:
For more information, see Risk states. |
|
Status |
The status of the risk. Possible values are:
For more information, see Risk statuses. |
|
Status Reason |
An explanation of the risk status that results from IVA scanning, if applicable. |
|
Resolution Date |
The date when the risk was resolved. This field is set to N/A if the state of the risk is not Mitigated, False Positive, or Accepted. |
|
Age |
The number of days since the risk was discovered. A risk in the Risks table continues to age regardless of whether the risk is resolved. |
|
Days to Resolution |
The number of days between the discovery and resolution of the risk. This field is set to N/A if the state of the risk is not Mitigated, False Positive, or Accepted. |
|
Asset Tags |
The tags that apply to the asset where the vulnerability was discovered. |
|
Deployment ID |
The deployment ID of the scanner that performed the IVA scan, if applicable. |
|
Most Recent Detection |
The date and time when the risk was last seen. |