Views:

Get a comprehensive view of your organization's vulnerability posture and quickly understand the status of vulnerability-related risks in your environment.

The Vulnerability Overview tab in Vulnerability Management provides information that allows you to assess the number, distribution, and severity of vulnerabilities in your environment at a glance. Get detailed information on time-critical vulnerabilities, view key vulnerability metrics organized by impact score, asset type, and asset group, and monitor exposure over time to help prioritize mitigation efforts.
Important
Important
To view information in Vulnerability Overview, your user account must have View permissions for Vulnerability Management and Threat and Exposure Management.
Data for network devices discovered by Network Vulnerability Scanner is only available for users with the Unmanaged devices asset visibility scope. Data for internet-facing assets is only available for users with the Internet-facing assets asset visibility scope. For more information, see Asset Visibility Management.
The following table describes the available widgets in Vulnerability Overview and their uses.

Vulnerability Overview widgets

Widget
Description
Use
Time-critical vulnerabilities
Displays information about zero-day and time-critical vulnerabilities that are actively exploited or have a high risk of exploitation.
Important
Important
To view time-critical vulnerability detection data, you must enable Advanced Risk Telemetry in the policies assigned to your endpoint groups. For more information, see Endpoint Security Policies.
Use the displayed alerts to understand vulnerabilities that need immediate attention. Click alerts to view Time-critical CVE profiles, which contain details including
  • Affected operating systems
  • Affected devices
  • Number of exploit attempts in your environment
  • Available attack prevention/detection rules
  • Recommended mitigation or remediation actions
Unique vulnerabilities by impact score
Displays the distribution of vulnerabilities in your environment by CVE impact score. Click View vulnerabilities by asset group to view the distribution across your defined asset groups.
The chart transitions from total vulnerabilities to unique vulnerability distribution to help you visualize the overall risk posed by vulnerabilities in your environment.
Viewing by asset group allows you to see where you need to prioritize your remediation efforts. Click vulnerability counts in each asset group to directly view and manage individual vulnerabilities in Threat and Exposure Management. Add or remove assets from an asset group in Asset Group Management by clicking Manage asset groups.
High-impact CVE distribution by asset type
Displays the distribution and count of high-impact (impact score from 70 to 100) CVEs across the following asset types:
  • Internal assets
  • Internet-facing assets
  • Containers
  • Cloud VMs
  • Serverless functions
Asset types with no current high-impact vulnerabilities do not display.
Columns are sorted from highest to lowest CVE count to help you quickly identify the infrastructure layers that need the most attention. Click a CVE count to directly view and manage high-impact CVEs for the specified asset type in Threat and Exposure Management.
Unpatched vulnerabilities over time
Displays the trend of unpatched CVE events (individual CVE events that have not been system remediated) over the last 12 months. Each data point represents a snapshot of unpatched CVE events at the end of the specified month plus the latest real-time snapshot. Select an asset type to view the trend of unpatched CVE events for that asset type.
Note
Note
Displayed impact level counts represent the impact level counts of all CVE events affecting the selected asset type. If a CVE affects more than one asset type, that CVE may count as a high-impact event for one asset type but lower-impact for other asset types.
Use the trending chart to understand your organization's total risk exposure over time. An overall decreasing trend indicates less exposure and a stronger security posture.