Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Vulnerability Scan

Vulnerability Scan Dashboard

The Vulnerability Scan Dashboard provides a comprehensive view of your organization’s vulnerability status, helping you track and manage risks associated with known vulnerabilities (CVEs). This dashboard is organized into multiple sections to enable quick analysis and decision-making regarding vulnerability mitigation.

Written by Noah Garland

Updated at November 26th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Vulnerability Risk Grade Vulnerability Trend Chart Top 5 Vulnerability Profiles Targets with the Most Vulnerabilities All Vulnerabilities with Impacted Hosts Open Ports Summary Active Vulnerability Scans Last 5 Vulnerability Scans Scheduled Vulnerability Scans Mitigation Plans in Progress

Vulnerability Risk Grade

The Vulnerability Risk Grade displays the overall risk level based on the number and severity of vulnerabilities detected during scans. The primary grade shown corresponds to the current reporting period (e.g., Month or Quarter), while a smaller grade below represents the previous period, providing a quick comparison of improvement or decline.

This section helps assess the effectiveness of your vulnerability management over time by displaying the progress in reducing risk levels.

Vulnerability Trend Chart

The Vulnerability Trend Chart offers a historical view of the vulnerabilities discovered in your environment, segmented by severity levels over different time intervals. This allows you to analyze trends in vulnerability discovery and remediation efforts over time.

  • Time Filter: Use the W (Week), M (Month), Q (Quarter), or Y (Year) options at the top-right corner to select the time period for the trend chart.
  • Severity Filter: Each severity level (Low, Medium, High, Critical) can be toggled on or off by clicking the respective legend item. This feature enables focused analysis on specific vulnerability severities.

Top 5 Vulnerability Profiles

The Top 5 Vulnerability Profiles table shows the most commonly identified operating systems or software with vulnerabilities. For each profile, it displays:

  • Uses: The number of instances of each profile found across your network.
  • Devices: The number of unique devices running each profile.

This section helps prioritize mitigation efforts based on the frequency of vulnerable profiles in your environment.


Targets with the Most Vulnerabilities

The Targets with the Most Vulnerabilities section lists the top 10 assets with the highest number of vulnerabilities. This section ranks each target by the number of critical, high, medium, and low vulnerabilities detected.

By focusing on targets with the most vulnerabilities, you can prioritize remediation actions on assets that present the greatest risk.


All Vulnerabilities with Impacted Hosts

In the All Vulnerabilities section, a detailed breakdown of CVEs detected in your environment is displayed, segmented by impact on workstations and servers.

  • Unique CVE Breakdown: This chart displays the number of unique CVEs affecting workstations and servers, categorized by severity. The "Total Unique" value counts each CVE once, even if it impacts both workstations and servers.
  • Unique CVE Breakdown by Timespan: This chart categorizes vulnerabilities based on their age, with time spans ranging from zero-day (recently discovered) to more than a year old.

The Root Cause Analysis button in this section allows you to investigate the underlying causes of vulnerabilities. By clicking this button, you can view detailed root causes and, in some cases, apply updates directly through the CYRISMA interface to address these vulnerabilities.


Open Ports Summary

The Open Ports Summary provides insights into the network ports that are currently open on devices within your environment. This section highlights:

  • Port Number: The specific port that is open.
  • Port Name: The associated protocol or service.
  • Risk Level: The risk level associated with each open port, which could range from low to high based on security implications.
  • No. of Machines: The number of devices on which each port is open.

By analyzing open ports, you can identify potentially unnecessary or risky network services that may need to be closed or restricted.


Active Vulnerability Scans

This section shows Active Vulnerability Scans in progress for your organization, displaying each scan’s status and percentage of completion. This enables real-time monitoring of ongoing scanning activities.


Last 5 Vulnerability Scans

The Last 5 Vulnerability Scans table lists the most recent scans performed in your environment. Each entry includes:

  • Scan Name: The name of the scan.
  • User Name: The user who initiated the scan.
  • Scan Start: The start time of the scan.
  • Scan Finish: The completion time.

This section provides quick access to recent scan results, helping you stay updated on vulnerability assessments.


Scheduled Vulnerability Scans

The Scheduled Vulnerability Scans table shows all planned vulnerability scans, including:

  • Scan Name: The name given to the scheduled scan.
  • Type: Specifies if it is a one-time or recurring scan.
  • Next Scan Date: The next date and time the scan is set to run.
  • Targets: The number of assets targeted for each scan.

This section helps ensure that scans are scheduled at appropriate intervals, supporting ongoing vulnerability management efforts.

Mitigation Plans in Progress

The Mitigation Plans in Progress section lists vulnerability mitigation plans that are actively being addressed. For each plan, it displays:

  • Plan Name: The name of the mitigation plan.
  • Assigned To: The user responsible for executing the mitigation plan.
  • Progress: A progress bar indicating the completion percentage of each plan.

This section provides visibility into the status of active mitigation efforts, ensuring that high-risk vulnerabilities are being addressed efficiently.

risk assessment security report security audit risk analysis threat detection

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Install the CYRISMA Agent for Mac OS
  • How to Remove Agent Configurations from the CYRISMA Web Platform
  • Schedule a Vulnerability Scan

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand