Viewing Vulnerable Network Devices in the Vulnerability Management Tool

Modified on Fri, 1 Aug at 12:53 AM

Summary

This article provides instructions on how to view vulnerable network devices in the Saner Vulnerability Management (VM) tool. The tool presents this data in two primary sections:

  • Vulnerable Devices section

  • Vulnerabilities section


Each section provides detailed insights into device-level and vulnerability-level data across your network.

1. Vulnerable Devices Section

To view vulnerable network devices:

  1. Log in to the Saner VM tool dashboard.

  2. Navigate to the Vulnerable Devices section.

  3. Use the Family filter and select "Others" to list all vulnerable network devices in your account.


Once applied, the filter will update the table to display only relevant devices. The table presents the following columns:


ColumnDescription
Host NameDisplays the hostname of the device. Clicking the hostname redirects to the Device Details page with comprehensive vulnerability information.
Operating SystemShows the OS installed on the device.
GroupIndicates the group or classification the device belongs to.
Risks CountShows the total number of vulnerabilities detected on the device.
Severity DistributionBreaks down the vulnerabilities by severity:
- Critical: Red
- High: Orange
- Medium: Yellow
 - Low: Blue
AssetsLists vulnerable software running on the device. Clicking the number reveals a detailed list of affected applications.
Last ScannedDisplays the date and time of the last scan performed on the device.
StatusIndicates whether the device is currently Active or Inactive.


Note:

  • Devices with no vulnerabilities will show a thumbs-up icon under Risks Count and display "No Vulnerabilities" in the Severity Distribution column.


2. Vulnerabilities Section

The Vulnerabilities section provides a CVE-centric view of vulnerabilities discovered in your network.

How to access:

  1. Navigate to the Vulnerabilities tab in the Saner VM tool.

  2. View vulnerabilities listed by their CVE ID.

ColumnDescription
IDDisplays the unique CVE ID of each detected vulnerability.
TitleProvides a brief description of the vulnerability.
SeverityIndicates the assigned severity level of the CVE.
AssetsShows the number of affected applications in your account.
HostsIndicates the number of devices impacted by the CVE.
Detection DateThe date the vulnerability was detected by Saner VM.
Release DateThe date the vulnerability was publicly disclosed by the vendor.
FixSpecifies the recommended remediation or patch to resolve the vulnerability.

Conclusion

Using the Vulnerable Devices and Vulnerabilities sections within the Saner VM tool enables administrators to efficiently identify, assess, and remediate security risks across network-connected devices.


For additional help, please contact the support team at support@secpod.com.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article