Enterprise TruRisk Management Release 1.5.1

November 24, 2025

Enhanced Risk Acceptance Feature 

With this release, the Risk Acceptance workflow is enhanced to strengthen governance, accountability, and ease of justification during exception handling.

The enhancements include improved Reason Management, an approval workflow for sub users, and enhancements to permissions.

Enhanced Reason Management

While creating a Risk Acceptance Rule, users can now provide structured and consistent reasoning instead of relying solely on free-text input.

New Options in the Reasoning Section

There are now two options available:

  • System-Defined Reasons

    Select from a predefined list of system-generated reasons for accepting a risk.

    Examples: Legacy system dependency, Patch not available, and so on.

  • Additional Custom Reason

    Optionally, provide your own detailed explanation in addition to the predefined reason.

Supporting Documents

You can now upload supporting evidence to justify their risk acceptance decisions.

  • Supported file types: PDF, TXT, xlsx, or image formats (jpeg)
  • Maximum file size: 5 MB

Approval Workflow for Sub-Users

A new approval flow is introduced to manage rules created by Sub-Users.

How It Works

  1. When a sub-user creates a new rule, it does not activate immediately.
  2. The rule first moves to a Pending Approval state.
  3. The Manager receives a notification to approve or reject the request.

Approval Actions

  • Approve

    The manager can approve a rule directly. Once approved, the rule automatically moves to the Active state.

  • Reject

    When rejecting, the manager must provide a reason for the rejection.

  • The rejection reason is displayed as a tooltip or message in the rule list.

Permission Enhancements

The following permissions are updated for Manager users and Sub users.

  • Manager users can:

    • Create and activate rules directly.
    • Update, or delete exception rules
    • Review, approve, or reject rules submitted by sub-users.
  • Sub-users must have the following specific Risk Acceptance permissions in VM application:
    • Allow Exception Create/Update/Delete.
    • If this permission is not assigned, the Risk Acceptance tab remains inaccessible.

Enhanced Search with New Tokens Support (Aligned with VMDR Capabilities)

To improve threat visibility and risk-based vulnerability management, we have launched a new set of search tokens that are compatible with VMDR capabilities. This release includes support for Real-Time Threat Indicator (RTI) tokens, along with additional tokens for the Findings tab.

Support for Real-Time Threat Indicator (RTI)

Real-Time Threat Indicators provide live intelligence about vulnerabilities that are actively exploited, weaponized, or associated with ongoing attack campaigns. With these new tokens, you can now search, analyze, and prioritize vulnerabilities based on real-time threat context, enabling faster remediation and stronger proactive defense.

RTIs enrich your vulnerability data with real-world threat context. Each indicator represents an active, emerging, or predicted threat that increases the risk associated with a vulnerability. 

Integrating RTIs into your system helps you:

  • Prioritize effectively: Focus on vulnerabilities that are currently being exploited in the wild.
  • Reduce attack exposure: Address actively targeted vulnerabilities before they are used against your environment.
  • Enhance threat awareness: Understand the type and intensity of real-world threats associated with your assets.
  • Align with risk-based remediation: Combine CVSS severity with real-time threat context for more thoughtful prioritization.

This enhancement enables you to combine vulnerability detection with real-time threat intelligence, giving you a powerful, threat-driven approach to managing and mitigating risks. 

New Tokens for Risk Management's Findings Tab

These tokens help you identify vulnerabilities that pose active, high-impact risks and take immediate remediation action. These Tokens are available for all subtabs of Findings, including Overview, All, Vulnerabilities, and Misconfigurations. 

Token Description

finding.threatIntel.is
ActiveAttack

Use the search token to view findings related to real-time threats due to active attacks.

finding.threatIntel.isActiveAttack: TRUE

finding.threatIntel.is
CisaKnown
ExploitedVuln

Use the search token to view findings related to real-time threats due to CISA exploits.

finding.threatIntel.isCisaKnownExploitedVuln: TRUE

finding.threatIntel.is
DenialOfService

Use the search token to view findings related to real-time threats due to denial of service (DoS).

finding.threatIntel.isDenialOfService: TRUE

 

finding.threatIntel.is
EasyExploit

Use the search token to view findings related to real-time threats that are easy to exploit.

finding.threatIntel.isEasyExploit: TRUE

finding.threatIntel.is
ExploitKit

Use the search token to view findings related to real-time threats associated with an exploit kit.

finding.threatIntel.isExploitKit: TRUE

finding.threatIntel.is
HighDataLoss

Use the search token to view findings related to real-time threats involving high data loss.

finding.threatIntel.isHighDataLoss: TRUE

finding.threatIntel.is
HighLateralMovement

Use the search token to view findings related to real-time threats with high lateral movement potential.

finding.threatIntel.isHighLateralMovement: TRUE

finding.threatIntel.is
Malware

Use the search token to view findings related to real-time threats involving malware.

finding.threatIntel.isMalware: TRUE

finding.threatIntel.
hasNoPatch    

Use the search token to find real-time threats due to no patch available.

finding.threatIntel.hasNoPatch: TRUE

finding.threatIntel.is
PredictedHighRisk

Use the search token to view findings related to real-time threats that are predicted to be of high risk.

finding.threatIntel.isPredictedHighRisk: TRUE

finding.threatIntel.is
PrivilegeEscalation

Use the search token to view findings related to real-time threats due to privilege escalation risk.

finding.threatIntel.isPrivilegeEscalation: TRUE

finding.threatIntel.is
PublicExploit

Use the search token to view findings related to real-time threats associated with a public exploit.

finding.threatIntel.isPublicExploit: TRUE

finding.threatIntel.is
Ransomware

Use the search token to view findings related to real-time threats involving ransomware vulnerabilities.

finding.threatIntel.isRansomware: TRUE

finding.threatIntel.is
RemoteCodeExecution

Use the search token to view findings related to real-time threats due to remote code execution risk.

finding.threatIntel.isRemoteCodeExecution: TRUE

finding.threatIntel.is
UnauthenticatedExploitation

Use the search token to view findings related to real-time threats due to unauthenticated exploitation risk.

finding.threatIntel.isUnauthenticatedExploitation: TRUE

finding.threatIntel.is
Wormable

Use the search token to view findings related to real-time wormable threats.

finding.threatIntel.isWormable: TRUE

finding.threatIntel.is
ZeroDay

Use the search token to view findings related to real-time threats involving a zero-day exploit.

finding.threatIntel.isZeroDay: TRUE

finding.criticality

Use the search token value as CRITICAL, HIGH, MEDIUM, LOW, or NONE to find assets with vulnerabilities of this type.

finding.criticality: HIGH

finding.lastFixedDate 

Use the search token value as a specific date or select a time range from the drop-down to find findings based on when they were last fixed.

finding.lastFixedDate: [2024-10-21 .. 2025-01-15]

finding.isFound

Use the token to view findings related to vulnerabilities are detected or not on the assets.

finding.isFound: TRUE

finding.riskFactor.
trending

Use this token to retrieve the list of QIDs that are trending within a specified time range.

finding.riskFactor.trending: [16..30]

 

finding.connectionId

Show assets sourced from a specific connector created by the user.

finding.connectionId: 1278237

finding.qid

Use an integer value to define the QID.

finding.qid: 90405

finding.requiredPrivilege

Use the search token to find vulnerabilities based on the level of access or privileges required by an attacker to exploit them. 

finding.requiredPriviledge: MEDIUM

Enhanced Default GroupBy View Updated to CVE for Vulnerabilities Tab

With this release, the default view of the Vulnerabilities Listing page has been enhanced. The vulnerabilities are now grouped by CVE (Common Vulnerabilities and Exposures) by default, providing a standardized and more informative way to analyze vulnerability data.

A CVE (Common Vulnerabilities and Exposures) is a globally recognized identifier assigned to publicly known cybersecurity vulnerabilities. Each CVE ID (for example, CVE-2025-12345) represents a unique vulnerability record that includes a summary, impact details, and references to related advisories or patches. CVE identifiers are maintained to ensure consistent tracking and communication of security issues across platforms.

This change enables you to view and manage vulnerabilities using the industry-standard CVE identifiers, making it easier to correlate, compare, and prioritize issues. Grouping by CVE automatically consolidates all related detection under a single vulnerability ID, proving a cleaner, more organized view. 

Enhanced GroupBy Options  for Vulnerabilities Findings

We have introduced new options for GroupBy to enhance vulnerability filtering and visualization. You can use GroupBy as a filter to view vulnerabilities grouped by specific attributes.

These GroupBy options correspond to specific tokens. While tokens require a defined token value, GroupBy dynamically filters and displays findings based on the selected attribute.

Newly added GroupBy options and their corresponding tokens are:

  • Recently Trending (finding.riskFactor.trending)
  • CVSS Rating (finding.criticality)
  • Title (finding.title)
  • CVSS 3 Base Score (finding.cvss3BaseScore)
  • CVSS 2 Base Score (finding.cvss2BaseScore)
  • Last Found (finding.lastFoundDate)
  • Published (finding.cvePublishedDate)

You can access the new GroupBy options in the following UI sections:

  • Dashboard Widgets (Query Settings > Findings > All and Vulnerabilities )
  • Findings tab (All tab and Vulnerabilities tab)
  • Inventory tab (Asset Details > Security > TruRisk Score > Vulnerabilities tab)
  • Risk Workbench tab ( Start Prioritizing > Define Scope > Select Prioritization Approach > Prioritize Now > Risk Workbench Page > Findings > Vulnerabilities tab)

Extended GroupBy CVE Support and Multi Grouped Capability for Dashboard 

We have enhanced the GroupBy CVE functionality to provide more detailed data visualization within tables. You can now view multiple columns when using GroupBy CVE, providing insights into each CVE record. Along with these columns, a Detection Count column is also displayed for better visibility into occurrence trends.

The columns GroupBy CVE are:

  • Title
  • QVSS
  • Risk Factor
  • EPSS Score

We have also introduced Multi Grouped support for MITRE ATT&CK–related tokens, allowing you to group and analyze vulnerabilities across multiple MITRE attributes simultaneously.

  • finding.mitre.attack.tactic.id
  • finding.mitre.attack.tactic.name
  • finding.mitre.attack.technique.id
  • finding.mitre.attack.technique.name
  • finding.mitre.attack.subTechnique.id
  • finding.mitre.attack.subTechnique.name

mitre related multigroup

To know more about these token, refer to ETM Online Help.

Enhanced Asset Search with New Tokens Support (Aligned with CSAM Capabilities)

We have introduced a new set of search tokens for viewing asset details. These tokens help to retrieve detailed asset, software, hardware, and connector data, providing deeper insights into operational, performance, and security parameters. By aligning ETM search capabilities with CSAM, you can now execute refined queries, monitor asset activity, and perform targeted investigations with greater accuracy.

Token

Description

gpu.chip

Use the search token to find assets based on their GPU chip.

gpu.chip: "Eclipse"

gpu.manufacturer

Use the search find assets based on their GPU manufacturer.

gpu.manufacturer: "Matrox"

gpu.model

Use the search token to find assets based on their GPU model.

gpu.model: `MGA G200e`

gpu.name

Use the search token to find assets based on their GPU name.

gpu.name: "Matrox Electronics" 

gpu.tensorCores

Use the search token to find assets based on a specific tensor core count.

gpu.tensorcore: 12

volume.free

Use the search token to find assets with a specific free space (GB)

volume.free<= 30

volume.name

Use the search token to find assets with a specific size (GB).

volume.name:D

volume.size

Use the search token to find assets with a specific size (GB).

volume.size>90

agent.scanType

Use the search token to find assets from a certain scan type. (API Based Scan, Azure VM Scan, Cloud Agent Deep Scan, coresCloud Agent PC Scan, Cloud Agent SwCA Scan, Cloud Agent VM Scan, Cloud Perimeter Scan, EC2 VM Scan, GCP VM Scan, ML Authentication VM Scan, ML VM Scan, Snapshot Based Scan, Snapshot Based SwCA Scan, and Unknown Scan.)

agent.scanType: Snapshot Based Scan

asset.url

Use the search token filter web assets based on the IP, domain, subdomain, or URL used during web application creation.

asset.url: http://172.31.28

asset.lparID

Use the search token to find assets based on their LPAR ID.

asset.lparID: `6 LXAG-A72TL`

asset.isolated

Use the search token to find assets that are isolated.

asset.isolated: FALSE

asset.lastInventoryDate

Use the search token value as a specific date or select a time range from the drop-down to search assets with the last inventory date within that range.

asset.lastInventoryDate:[2025-01-15 ... now-1M]

agent.lastCheckedInDate

Use the search token value as a specific date or select a time range from the drop-down to find assets based on when the agent last checked in to the platform.

agent.lastCheckedInDate:[2024-01-01 .. 2020-01-10]

agent.firstScanDate

Use the search token value as a specific date or time range to find assets based on their first scan date.

agent.firstScanDate <= '2022-10-04'

agent.lastScanDate

Use the search token value as a specific date or time range to find assets based on their first scan date.

agent.lastScanDate>= '2022-10-04'

Enhanced GroupBy Options for Assets

We have introduced new options for GroupBy to enhance assets filtering and visualization. You can use GroupBy as a filter to view vulnerabilities grouped by specific attributes.

These GroupBy options correspond to specific tokens. While tokens require a defined token value, GroupBy dynamically filters and displays findings based on the selected attribute.

You can access the new GroupBy options in the following areas:

  • Dashboard Widgets (Query Settings > Assets )
  • Findings tab (Assets Pivote from All tab / Vulnerabilities  tab/ Misconfigurations tab)

Newly added GroupBy options include categories, subcategories. Refer to the following table to view all categories, subcategories, and their corresponding tokens.

Category Subcategory Options
BIOS Description (asset.biosDescription)
Processor (asset.cpuCount)
Timezone (asset.timezone)
Total Memory (asset.totalMemory)
External Attack Surface Organization/Subsidiary (asset.org.name
ISP (asset.isp
asn (asset.asn
Domain (asset.domain
Subdomain (asset.subdomain asset.org.name)
Registrar (whoIs.registrar )
Registrant Org  (whoIs.registrantOrg )
Registrant Email ID (whoIs.registrantEmailId )
Hardware Category (hardware.category)
Manufacturer (hardware.manufacturer)
Model (hardware.model)
Product (hardware.product
DNS Address (asset.interfaces.dnsAddress)
Cloud Provider (cloud.provider )
Service Name (service.name )
Software Product Edition (operatingSystem.edition)
Market Version (operatingSystem.marketVersion )
Name (operatingSystem.name)
Category (operatingSystem.category)
Publisher (operatingSystem.publisher)
AWS Account ID (aws.ec2.accountId)
Image ID (aws.ec2.imageId)
Instance Type  (aws.ec2.instanceType)
Region Name  (aws.ec2.region.name)
Subnet ID (aws.ec2.subnetId)
VPC (aws.ec2.vpcId)
Tags Tags Name  (aws.tag.key)
Tags Value  (aws.tag.value)
Azure  Location (azure.vm.location)
Virtual Network (azure.vm.virtualNetwork)
Resource Group Name  (azure.vm.resourceGroupName)
VM Size  (azure.vm.size)
Subscription ID  (azure.vm.subscriptionId)
GCP Machine Type (gcp.compute.machineType)
VPC Network (gcp.compute.network )
Project ID (gcp.compute.projectId )
Project Number (gcp.compute.projectNumber )
Zone (gcp.compute.zone )
OCI Compartment ID (oci.compute.compartmentId )
Compartment Name (oci.compute.compartmentName )
Region (oci.compute.region )
Tenant ID  (oci.compute.tenantId )
Tenant Name (oci.compute.tenantName )
IBM Datacenter ID (ibm.virtualServer.datacenterId )
Domain (ibm.virtualServer.domain )
Location (ibm.virtualServer.location )
Private Vlan (ibm.virtualServer.privateVlan )
Alibaba  Account ID (alibaba.instance.accountId )
Image ID (alibaba.instance.imageId )
Instance Type  (alibaba.instance.instanceType )
Instance State  (alibaba.instance.instanceState )
Region Code  (alibaba.instance.region.code )
Region Name  (alibaba.instance.region.name )
VPC (alibaba.instance.vpcId)
VPC Switch ID (alibaba.instance.vswitchId)
Zone ID (alibaba.instance.zoneId)
Tags (asset.tag.name)

Issues Addressed

The following reported issues are fixed in this release.

Component Description

Documentation

Corrected the token name discrepancy on the Risk Acceptance page. The documentation now displays the correct token name to asset.tag.name
Dashboard Resolved a UI issue where Business Entities chart labels in the TruRisk Summary were not visible on smaller screens. The labels now display correctly across all screen sizes.
Dashboard

Resolved an issue where ETM dashboard widgets displayed incorrect TruRisk scores (showing “-1” or abnormal negative percentages). The score calculation logic has been corrected, and widgets now show accurate values.

Dashboard In the ETM Dashboard, users observed that when creating a widget using only an asset-based query (for example, operatingSystem.category:'windows client' and tags.name:'Child Tag'), the trend graph was not displayed. The dashboard logic for data retrieval and trend visualization has been updated to ensure that widgets created with only asset queries now correctly display the trend graph. Users can now view accurate trend data for all asset-based widgets.