Overview
This feature provides a consolidated view of the Top Vulnerable Assets in your environment, based on CVE (Common Vulnerabilities and Exposures) IDs and the number of devices impacted. It helps security teams quickly identify and prioritize high-risk assets for remediation.
Key Features
1. CVE-Based Asset Visibility
The panel displays a list of assets that are most vulnerable, categorized by their associated CVE ID. Alongside each CVE, you'll see the number of devices affected, helping you gauge the spread and severity of each vulnerability.

2. Export to Excel (CSV)
You can export the asset information by clicking on the CSV icon located within the pane. This allows you to:
Perform offline analysis
Share data with other teams
Integrate with external reporting systems
3. Search Functionality
A search bar is available to help you quickly locate specific assets by their asset name. This streamlines the process of identifying affected devices, especially in large environments.
4. Quick Actions: Remediate or Exclude
The Quick Action section provides immediate options for handling the identified vulnerabilities:
Remediate: Initiate the patching or fixing process for the affected assets.
Exclude: Exclude specific assets from future vulnerability scans or reporting, if they are known exceptions or under valid exclusion policies.
Patch Approval: Review and approve patches before deployment. This helps ensure that only validated and authorized updates are applied in line with your organizational policies.
⚠️ Use exclusion with caution to avoid missing critical vulnerabilities in your environment.
Best Practices
Regularly review this pane to stay informed about emerging vulnerabilities.
Always validate exclusions with your internal security policy.
Use the CSV export to maintain historical records for compliance and audit purposes.
Need Help?
If you have questions or need assistance using this feature, please reach out to support@secpod.com
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article