A vulnerability scan captures vulnerability information in your network at a
single point in time. After you import the scan on the SMS, you can view CVE details
for every CVE identified within the vulnerability scan.
Procedure
- Select .
- Select a CVE from the CVE Search Results and click Details. Alternatively, you can double-click a CVE in the CVE Search Results.
- Click
Details to:
- Access the URL link to the CVE database.
- Flag the CVE for follow-up. You can quickly search for flagged CVEs on the SMS.
- Add or edit comments for the CVE. You can also add comments to the vulnerability scan.
- Click
Ignored Profiles to view a list of profiles, and do the following:
- Select a profile, and click Ignore to hide the profile from the list of Not Protected Profiles and Protected Profiles. See View CVE search results.
- Select a profile, and click Show to display the profile on the list of Not Protected Profiles and Protected Profiles. See View CVE search results.
- Click Filters to view a list of active DV filters that correlate with the CVE.
- Click Assets to view a list of network assets, such as the host IP addresses and the asset groups vulnerable to the CVE, as identified in the vulnerability scan.
- Click OK.