Summary
This article provides instructions on how to view vulnerable network devices in the Saner Vulnerability Management (VM) tool. The tool presents this data in two primary sections:
Vulnerable Devices section
Vulnerabilities section
Each section provides detailed insights into device-level and vulnerability-level data across your network.
1. Vulnerable Devices Section
To view vulnerable network devices:
Log in to the Saner VM tool dashboard.
Navigate to the Vulnerable Devices section.
Use the Family filter and select "Others" to list all vulnerable network devices in your account.
Once applied, the filter will update the table to display only relevant devices. The table presents the following columns:
Column | Description |
---|---|
Host Name | Displays the hostname of the device. Clicking the hostname redirects to the Device Details page with comprehensive vulnerability information. |
Operating System | Shows the OS installed on the device. |
Group | Indicates the group or classification the device belongs to. |
Risks Count | Shows the total number of vulnerabilities detected on the device. |
Severity Distribution | Breaks down the vulnerabilities by severity: - Critical: Red - High: Orange - Medium: Yellow - Low: Blue |
Assets | Lists vulnerable software running on the device. Clicking the number reveals a detailed list of affected applications. |
Last Scanned | Displays the date and time of the last scan performed on the device. |
Status | Indicates whether the device is currently Active or Inactive. |
Note:
Devices with no vulnerabilities will show a thumbs-up icon under Risks Count and display "No Vulnerabilities" in the Severity Distribution column.
2. Vulnerabilities Section
The Vulnerabilities section provides a CVE-centric view of vulnerabilities discovered in your network.
How to access:
Navigate to the Vulnerabilities tab in the Saner VM tool.
View vulnerabilities listed by their CVE ID.
Column | Description |
---|---|
ID | Displays the unique CVE ID of each detected vulnerability. |
Title | Provides a brief description of the vulnerability. |
Severity | Indicates the assigned severity level of the CVE. |
Assets | Shows the number of affected applications in your account. |
Hosts | Indicates the number of devices impacted by the CVE. |
Detection Date | The date the vulnerability was detected by Saner VM. |
Release Date | The date the vulnerability was publicly disclosed by the vendor. |
Fix | Specifies the recommended remediation or patch to resolve the vulnerability. |
Conclusion
Using the Vulnerable Devices and Vulnerabilities sections within the Saner VM tool enables administrators to efficiently identify, assess, and remediate security risks across network-connected devices.
For additional help, please contact the support team at support@secpod.com.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article