After the administrator has configured Cyber Integrity to download the latest vulnerability data each day, you can use the Cyber Integrity navigation bar options and associated windows to perform vulnerability-management tasks:
-
View a summary of detected vulnerabilities and drill down to more details.
-
Browse vulnerabilities by category, type, and risk score and drill down to more details.
-
Investigate risk analysis and factors used to calculate risk scores.
-
Manage CVE application in your environment.
-
Refine the vulnerability matching rules to improve matching for your specific environment and set of assets.
-
Use the defined workflow to investigate identified matches and remediate or mitigate the associated vulnerabilities.