Risks and Unassigned Risks sections

On the Risks page, the Risks section displays a table with details about each risk that was identified in the network. On the Management Plan page, the Unassigned Risks section displays a table with risks that are not currently assigned to a plan. Both tables have the same columns.

To change how information is organized in the table, do any of these actions:

  • To set the number of rows that appear on a page, in the Show x Entries list, select a value.
  • To add or remove table columns, click Columns, and then select the checkboxes of the columns you want to display.
  • To sort data by a specific column, click the column heading.
  • To configure the risks that display in the table, change the filters.

    For more information, see Filter target groups by tags and Filters section.

Both tables display this information:

Column

Description

Checkbox

Enables you to select or clear the checkboxes of all risks currently displayed on the page.

For example, if you have a total of 832 risks, when you select 100 in the Show Entries list, 100 risks are selected after you select this checkbox.

Source

The source that discovered the risk. For example, a scan or Arctic Wolf Agent.

Host

The host where the risk was discovered.

Issue

The risk title or issue name.

Risk Score

The risk rating. The higher the risk score, the more severe the risk.

Asset Criticality

The criticality value of the asset where the risk was discovered.

For more information, see Edit asset criticality.

OS

The operating system (OS) of the asset where the vulnerability was discovered.

Asset Category

The category of the asset where the risk was discovered.

Action

The action that is required to mitigate the risk. Possible values are:
  • All — Includes all risks.
  • Breach — Risks that are related to a security incident, where data is compromised or stolen.
  • Configuration — Risks that are typically resolved by making a configuration change.
  • User Investigation — High level risks that are flagged for additional investigation. This action is automatically applied to risks.
  • Upgrade — Risks that are typically resolved by applying the latest vendor patch.

State

The state of the risk. Possible values are:
  • Open
  • False Positive
  • Acknowledged, In-Planning
  • Mitigation/Fix in Progress
  • Fixed, Waiting Validation
  • Accepted
  • Unsuccessful Validation
  • Mitigated

For more information, see Risk states.

Status

The status of the risk. Possible values are:
  • Active
  • Inactive
  • Obsolete
  • Mitigated

For more information, see Risk statuses.

Status Reason

An explanation of the risk status that results from IVA scanning, if applicable.

Resolution Date

The date when the risk was resolved. This field is set to N/A if the state of the risk is not Mitigated, False Positive, or Accepted.

Age

The number of days since the risk was discovered. A risk in the Risks table continues to age regardless of whether the risk is resolved.

Days to Resolution

The number of days between the discovery and resolution of the risk. This field is set to N/A if the state of the risk is not Mitigated, False Positive, or Accepted.

Asset Tags

The tags that apply to the asset where the vulnerability was discovered.

Deployment ID

The deployment ID of the scanner that performed the IVA scan, if applicable.

Most Recent Detection

The date and time when the risk was last seen.