Vulnerability Report

Introduction

See the bottom of this article to download a sample copy.


The vulnerability report provides a consolidated view of all the Common Vulnerabilities and Exposures (CVEs) Field Effect has detected within a month, and groups them by severity. A report summary of all CVEs is included, along with a drilled in report for every individual CVE. 


For each CVE, the following information is included: 

  • A description including severity, weaknesses, and other metrics.
  • A list of affected endpoints with details about the affected software. 


The information in this report aims to help you make informed decisions regarding your organization's risk mitigation and the prioritization efforts, reducing the threat surface in your environment. 


Accessing Reports

Accessing Reports as a Client

This report, along with all other Field Effect reports, can be accessed from the Insights section's Reports view



Accessing Reports as a Partner

When the organization selector is set to a specific client, you still can access the Reports view from the sidebar's Insights section (shown above), but there will be fewer pages available to you was a partner, as they are available via specific client view.



Viewing The Report

Report Summary 

The first page of the report summarizes all theCVEs Field Effect has detected within a month. CVEs are grouped by severity level, and the number of endpoints is also tallied, along with number of CVEs per severity level. Helpful links are also included to deepen your knowledge about the issues that may be impacting your organization.


In the example below, the Field Effect has detected six unique CVEs affecting the organization within the month, and 2 of them were critical. Three high severity CVEs were detected, and they are impacting seven hosts in the organization.



CVE Summaries

Every CVE included in the preceding Report Summary will also have a corresponding CVE report that provides a greater level of detail. 


Each CVE Report includes a description, ranking, and details about the CVE, along with a link to the CVE listing in the MITRE database


the affected Endpoint section lists all the endpoint devices affected by the CVE in a table with general information such as the endpoint's operating system, impacted software, and the path. Clocking on the hostname will take you to that device's entry in the MDR Portal's Endpoint Devices page.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article