Exposure Overview

Gain insights into how vulnerable your devices and network are to attack.

The following table outlines the available widgets.

Widget

Description

Exposure Index

Your company's average exposure risk over the last 30 days

The Exposure Index score is calculated based on numerous factors including unpatched vulnerabilities and the likelihood of attack.

Vulnerability Assessment Coverage

The percentage of endpoints on your network running a supported operating system with Endpoint Sensor enabled compared to the total estimated number of endpoints in your organization

Increase your deployment of Endpoint Sensors to at least 80% for better results.

Highly-Exploitable Unique CVEs

The number of unique highly-exploitable CVEs detected in your environment

A highly-exploitable CVE is a critical vulnerability that is highly likely (or has been proven) to be exploited if not remediated.

Click View details to view a list of the CVEs detected in your environment.

Mean Time to Patch (MTTP)

The average time taken to apply critical patches on all managed endpoints running a supported Windows operating system

The Mean Time to Patch (MTTP) applies only to supported Windows platforms and major patch releases. You should carefully examine the MTTP data in conjunction with the Averaged Unpatched Time data to better mitigate highly-exploitable vulnerabilities on your network.

For more information, see Mean Time to Patch (MTTP) and Average Unpatched Time.

Average Unpatched Time

The average length of time that endpoints with highly-exploitable CVEs remain unpatched to the current date.

The Average Unpatched Time (AUT) applies only to supported Windows platforms and major patch releases. You should carefully examine the MTTP data in conjunction with the Averaged Unpatched Time data to better mitigate highly-exploitable vulnerabilities on your network.

For more information, see Mean Time to Patch (MTTP) and Average Unpatched Time.

Vulnerable Endpoint Percentage

The percentage of endpoints with highly-exploitable CVEs divided by the total number of supported endpoints

The Vulnerable Endpoint Percentage applies to all endpoints with Vulnerability Detection enabled. The Highly-Exploitable CVE Density and Vulnerable Endpoint Percentage work together to help you tailor your response to vulnerable endpoint risks.

For more information, see Highly-Exploitable CVE Density and Vulnerable Endpoint Percentage.

Highly-Exploitable CVE Density

The total number of detected highly-exploitable CVEs divided by the total number of endpoints with Vulnerability Detection enabled

The density calculation includes operating system and application CVEs.

For more information, see Highly-Exploitable CVE Density and Vulnerable Endpoint Percentage.