View information on specific time-critical Vulnerabilities detected in your environment along with options for mitigation.
The detection of time-critical vulnerabilities can indicate an ongoing zero-day attack
or correspond with high-profile N-day vulnerabilities.
-
Zero-day vulnerabilities have no patch when published, so the vulnerability can only be mitigated.
-
N-day vulnerabilities have patches available when published, so the vulnerability can be mitigated or remediated if your operating system supports the patch.
ImportantTo detect time-critical vulnerabilities on endpoints, you must have the Trend Endpoint
Agent deployed with Advanced Risk Telemetry enabled. Scans for time-critical vulnerabilities
occur hourly.
|
The primary criteria for issuing a time-critical security alert include:
-
High potential impact
-
High likelihood of related exploit attempts
-
Publicly available exploit code
To learn more about a detected time-critical vulnerability, including affected operating
systems, available attack prevention/detection rules, and recommended mitigation or
remediation options, click View details in the security alert. TrendAI™ only issues time-critical security alerts for vulnerabilities with available mitigation
options.
For high-profile N-day vulnerabilities, the Vulnerability profile displays a summary
including:
-
The number of assessed devices in your environment
-
How many assessed devices are affected by the vulnerability
-
How many endpoints have been the target of exploit attempts related to the vulnerability
The following table details the information displayed on the profile screen of a time-critical
vulnerability.
Time-Critical Vulnerabilities
|
Details
|
General information about the vulnerability, including affected operating systems,
the number of assessed devices in your environment, devices affected by the vulnerability,
and the number of exploit attempts
|
||
|
Attack Prevention/Detection Rules
|
Displays available rules from TrendAI™ products that can mitigate the risk posed by the vulnerability
|
||
|
Mitigation Options
|
Provides a set of recommended actions curated by TrendAI™ threat experts that you can use to mitigate the selected vulnerability on applicable
operating systems.
|
||
|
Reference
|
Displays additional reference links for the vulnerability
|
||
|
Affected Devices
|
Devices in your environment vulnerable to the time-critical vulnerability
TrendAI Vision One™ analyzes detection logs to determine how
often attackers have attempted to exploit the vulnerability on each endpoint.
|
