View information about the Vulnerabilities risk factor, which is determined by Vulnerabilities detected on your managed assets.
TrendAI™ uses global activity data, vulnerability information, and local detection activity
to analyze your environment and produce customized vulnerability assessment scores
for each asset. The Vulnerabilities risk factor contributes to your exposure level.
TrendAI™ sources vulnerability information from the National Vulnerability Database (NVD)
and security advisories issued by major software vendors, such as Microsoft and Red
Hat. The NVD sometimes publishes information later than the vendors of affected products,
which might result in delayed vulnerability assessment results in TrendAI Vision One™.
The Vulnerability Assessment service scans endpoints for vulnerabilities related to
operating systems, applications, ECR container images, cloud VMs, and serverless functions.
For more information about the specific operating systems supported by Vulnerability
Assessment, see Vulnerability Assessment supported operating systems. For more information about supported language packages used in ECR container images,
see Vulnerability Assessment supported language
packages.
On Windows devices, Vulnerability Assessment updates between 10 minutes and 1 hour
after an operating system vulnerability is patched. Applications are scanned every
ten minutes. On macOS and Linux devices, Vulnerability Assessment scans for vulnerabilities
once per day.
ImportantTo start receiving vulnerability data in TrendAI Vision One™, you must first connect one or more vulnerabilities data sources. For more information,
see Vulnerability Assessment.
|
The following table outlines the widgets available in the
Vulnerabilities section.
|
Widget
|
Description
|
||||
|
Vulnerability Management Metrics
|
View information about vulnerabilities and operating system vulnerabilities affecting
your organization.
|
||||
|
Detected Vulnerabilities
|
Lists devices, internet-facing assets, containers, cloud VMs, and serverless functions
with vulnerabilities.
The tabs of the Detected Vulnerabilities widget display vulnerabilities detected on your internal and internet-facing assets,
containers, cloud VMs, and serverless functions. Mitigating the vulnerabilities with
the highest Vulnerability impact scores, global exploit activity, or CVSS scores is
an effective way to reduce the Cyber Risk Index.
|
The following table describes the risk indicators associated with the
Vulnerabilities risk factor.
|
Indicator
|
Description
|
Data sources
|
Target
|
|
OS vulnerability
|
The detection of exploitable operating system
vulnerabilities on the endpoint
|
|
|
|
Application vulnerability
|
The detection of exploitable application vulnerabilities
on the endpoint
|
|
|
|
Zero-day vulnerability
|
The detection of exploitable zero-day vulnerabilities on the endpoint
|
|
|
