The Vulnerabilities tab gives you a complete view of the vulnerability posture of the assets in your industrial network.
In the upper left corner, you see your network's total count of vulnerability detections. These are the vulnerabilities detected by Qualys Network Passive Sensor.
In the search bar, you can build QQL queries to narrow down the scope of your vulnerability search by using the supported search tokens. For more information, see Search Tokens for VMDR OT.
Right below the total detections, you see vulnerabilities grouped into various categories. After you click a category in this list, your selection gets translated into a QQL query in the search bar, and the vulnerabilities that fit into your selected category are displayed in the vulnerabilities table.
By using the date and time range selector next to the search bar, you can choose to view vulnerabilities detected within a specific time period.
The vulnerabilities table contains the list of detected vulnerabilities and their following details:
|
|
If you are interested in viewing granular details of a vulnerability, click the QID. On the Vulnerability Details page, you can view the detection summary, general information about the detected vulnerability, information about known exploits for the vulnerability available from third-party vendors and/or publicly available sources, available patches to fix the vulnerability and any published malware associated with the vulnerability.
To view details of a vulnerability, click the QID from the Vulnerability tab
The detection summary and general information about the detected vulnerability are displayed on the Vulnerability details page. The Vulnerability details page contains information about known exploits for the vulnerability available from third-party vendors and/or publicly available sources, available patches to fix the vulnerability, and any published malware associated with the vulnerability.
You can view Customized Solution Comments for ICS QID in the General Information section of Vulnerability Details. It allows you to write customized solutions specific to your environment.
To add the solution comment for the vulnerability, go to VM/VMDR > KnowledgeBase and select Edit from the Quick Actions menu of the desired QID.
Go to the Solution section, and enter your Solution Comments.
Was this topic helpful?