Views:
Search enables you to search by extended criteria, across all filter categories, and includes options for user settings, severity, protocol, platform, modified or added filters, and vulnerability criteria.

Procedure

  1. Select Global Search to search across all listed profiles or select Search within a profile to search that particular profile.
  2. Select Filter Criteria to search for:
    Select this criteria: To search for ...
    Filter Type
    Suspicious URL Metadata
    • Include - Filters that include suspicious URL metadata.
    • Exclude - Filters that do not include suspicious URL metadata.
    Note
    Note
    The correct Digital Vaccine is required to enable the Suspicious URL Metadata field. Activate the Digital Vaccine after you upgrade the SMS.
    User Defined Filters
    Control
    • Category - All filters distributed by the TMC are initially tagged Category.
    • Filter - If a filter has been edited to use specific settings, select this check box.
    State
    Type Specific - Depending on device model, the same filter may have different states (for example, a filter may be enabled on a device but disabled on a different device).
    Filter Category
    Specific filter categories.
  3. Select Source Criteria to search for:
    Select this criteria: To search for ...
    Filter Released and Filter Last Modified
    When filters where released and when filters where last modified.
    Note
    Note
    After upgrading, activate a new Digital Vaccine before you can search for filters by released dates.
    Filter Source
    • Digital Vaccine
    • ThreatDV (Auxiliary DV), and select Malware
    • DV Toolkit, and select Any or a specific version
  4. Select Additional Criteria to search for.
  5. Select Filter Taxonomy Criteria to search for.
  6. Click Vulnerability Criteria to search for:
    Select this criteria: To search for...
    CVE ID
    Unique tracking number used to identify a Common Vulnerabilities and Exposures (CVE)
    Bugtraq ID
    Unique tracking number used to identify a Bugtraq ID
    Vulnerability Scan Database
    Vulnerability scans that have been imported for use on the SMS. Learn more.
    • Asset Addr(s) - One or more IP addresses for an asset. An asset is the network IP address of the host vulnerable to the CVE identified in the vulnerability scan.
    • Flagged - All CVEs that are flagged for follow-up.
    • Not Flagged - All CVEs that are not flagged.
  7. Click Search.