View Risk Findings

Risk management is a critical framework designed to safeguard organizational assets, maintain uninterrupted operations, and defend your organization's reputation against cyber threats. It involves identifying vulnerabilities and misconfigurations, monitoring them, and mitigating the threat. This section explains the Findings Overview and the listing of Vulnerabilities and Misconfigurations Findings.

Findings Overview

The Risk Management tab in ETM gives you an overview of Findings categorized as Vulnerabilities and Misconfigurations. The following screenshot displays the Findings Overview

Findings overview.

Vulnerabilities Findings

To view the vulnerabilities detected on your assets, navigate to the Risk Management > Findings page and select Vulnerability. You can also utilize various metadata filters, group by options, and custom query capabilities. Following is the Vulnerabilities data listed on the Findings page:

  • Vulnerability: This column lists the vulnerabilities detected on the assets. By clicking the Finding Name, you will be redirected to the Finding Summary page. 
  • QVSSQualys Vulnerability Scoring System (QVSS) is the scoring framework used in ETM to measure the severity of all security exposures, both vulnerabilities and misconfigurations, on a 0.0–10.0 scale.
  • Risk Factors:  Indicates the conditions or attributes that increase the likelihood or severity of a vulnerability being exploited.
  • Impact: Shows the potential damage or business effect if the vulnerability is successfully exploited.
  • EPSS Score: Displays the Exploit Prediction Scoring System value that estimates the probability of the vulnerability being exploited in the near term.
  • Detection Count: Represents the number of times this vulnerability has been identified across your monitored assets or environment.
  • The following Vulnerabilities screenshot under the Risk Management > Findings tab highlights its columns:

    Vulnerability findings tab.

View Vulnerability Finding Details

From the Vulnerability column, click View Details from the Quick Actions menu to view the following vulnerability details relating to the specific vulnerability:

This Findings Details page provides a complete risk, impact, and remediation view of a selected vulnerability (CVE).

Quick actions.

Refer to the following table for details on the fields.

Field  Information 

Header

This section displays the CVE ID, severity level (Medium), and Patch Available status.

  • Displays the CVE ID, severity level (Medium), source,Real Threat Indicators (RTI), and Patch Available status.

  • Shows a short vulnerability description.

  • Includes Real Threat Indicators (RTI) such as Easy Exploit, Exploit Public, and Predicted High Risk.

  • The Impacting panel on the right shows:

    • Total affected assets 

    • Impacted business entities (if available)

CVSS vs QVSS Risk Comparison

This section compares technical severity with threat intelligence–based risk.

Use this section to understand whether the vulnerability is technically severe and whether it is actively exploited.

  • CVSS Base score Standard 
  • Threat Signals – Weaponized POC, malware presence, threat actors, CISA KEV status, EPSS probability, and trending status.
  • QVSS Base  – Contextual risk score adjusted using real-world threat intelligence.
Vulnerability Details

Provides classification and mapping information.

Use this section to understand the detection of the vulnerability

  • Protocol & Port

  • Type
  • Affected Technology
  • MITRE ATT&CK mapping (if available).

Remediation & Actions

Use this section to identify how to fix the vulnerability.

  • Shows the number of available remediation steps.

  • Displays mitigation guidance status (Not Available in this case).

Your Impact

Provides environment-specific exposure details:

Use this to prioritize remediation based on exposure and external risk.

  • Total impacted assets
  • Internet-facing asset count
  • Business entity mapping (if configured)
Peer Benchmarking
 

Use this to evaluate performance maturity when data exists.

  • Compares your remediation performance with peers and the top 10%.
  • Displays MTTR (Mean Time to Remediate) if available.
Vulnerability Lifecycle
 

Use this to understand how long the vulnerability has been active and exploited.

Timeline view showing:

  • First exploit POC date
  • Published date
  • First patch release date
  • CISA KEV added and due dates

Search Vulnerabilities

  1. Choose Vulnerability to display vulnerability data or Asset for asset data. You can easily browse the data list and explore details. For example, click the CVE 2021-40438 to view details for that vulnerability.
  2. The Group By option helps you organize your data. For example, you can select Group By Severity and then click any value listed in the Detection Count column to view the list of assets with the assigned severity.
  3. Use filter. The filter option lets you choose the type of vulnerabilities to exclude from the data list.
  4. Use Quick Filters located in the left navigation. The Quick Filters option lets you choose the type of vulnerabilities to filter the vulnerabilities further.
  5. Use search tokens to filter vulnerabilities further.  
  6. Customize the display of rows and columns as per your needs. You can choose which columns to show or hide based on their preferences

Misconfiguration Findings

To view the misconfigurations detected on your assets, navigate to the Risk Management > Findings page and select Misconfiguration. You can also utilize group by options, and custom query capabilities. Following is the Misconfiguration data listed on the Findings page:

  • Title: Indicates the rule or misconfiguration name
  • Technology/Category: Indicates Technology and Category of the misconfiguration
  • QVSS Base: Indicates QVSS Base Score such as High, Critical, Low and Medium
  • Sources: Indicates source of the misconfiguration.
  • Impacted Asset: Indicates which asset is impacted
  • Lifecycle Information: Indicates when the issue was first detected and whether it is currently active (Fail)
  • Host Name: Indicates Host name
  • IP Address: Indicates IP address of the assets,
  • TruRisk Score: Represent the score
  • ACS: Indicates Asset Criticality Score
  • Operating System: Indicates Operating system 

The following Misconfigurations screenshot under the Risk Management > Findings > Misconfigurations highlights its columns:

Misconfiguration tab.

View Misconfiguration Finding Details

Click View Details from the Quick Actions menu to view the following details about a specific misconfiguration.

Misconfiguration quick actions.

  • Summary: It displays basic details, reference ID, status, QDS, severity and description of the misconfiguration and the details of the asset on which the misconfiguration is detected.

  • QDS Details: It displays the QDS contributing factors for the misconfiguration:

    • Highest Contributing CVE:- Click the CVE number, and theAdditional Insights display the Technical Attributes, Recency, and Remediation.
    • Associated Malware and Threat Actors: Click on the Malware count to view the data in the Additional Insightssection.
    • Exploitability: It displays the date when the exploitability recently trended. TheRecencysection of the Additional Insights graph displays the time when the CVE trended.
    • Additional Insights: When you click Additional Insights, it displays more information about the vulnerability' s Technical Attributes, Temporal Attributes, Trending, and Remediation. 
  • Detection Details: This section specifies:
    • The detection rationale a logic of how a security vulnerability is identified.
    • Misconfiguration impact and remediation guidance to fix the misconfiguration. 
  • Additional Details: Additional details about control/ CSAM rule and policy that is evaluated on an asset. It is supplementary information that provides further context about the policy and control.
  • MITRE ATT&CK: MITRE Tactics and Techniques associated with the control that evaluated on an asset.
  • Sources: If the same misconfiguration is detected from multiple sources on the same asset then this section displays the aggregated record created based on the merge rules and individual source records displaying the multiple sources from where the misconfiguration is detected.

Search Misconfigurations

Search misconfigurations.

  1. Choose Misconfiguration to display misconfiguration data orAssetfor asset data. You can easily browse the data list and explore details.
    For example, click the Title: EOS: Google Chrome 84.0.4147.125 Stable Channel to view details for that misconfiguration.
  2. TheGroup Byoption helps you organize your data. For example, you can selectGroup By Severityand then click any value listed in the Detection Count column to view the list of assets with the assigned severity.
  3. Use filter. The filter option lets you choose the type of misconfiguration to exclude from the data list.
  4. Use quick filters located in the left navigation. The Quick Filters option lets you choose the type of misconfigurations to filter the misconfigurations further.
  5. Use search tokens to further filter the data list.
  6. Download the report.
  7. Toggle the display of the bar chart using  icon.
  8. Customize the display of rows and columns as per your needs. You can choose which columns to show or hide based on their preferences.