Vulnerabilities

<< Click to Display Table of Contents >>

Raynet One > 1.1 > User Guide > Workspaces in the sidebar menu > Asset Management 

Vulnerabilities

IT security is key for well-performing and safe IT landscape. So, logically, outdated software or hardware (EoS and EoL) as well as so-called shadow IT (individually installed software from the internet, open source) potentially brings along security gaps. This is why under Vulnerabilities, you get a full summary of vulnerabilities detected in your managed environment.

 

The view also displays a standardized vulnerability score numbered from 1 to 10 and in different colors suggesting the urgency of taking action. Generally, red or orange state items with values between 7 and 10 usually demand attention, security investigation and sometimes even changes in the software portfolio.

 

Via Vulnerabilities you can further:

check on existent vulnerabilities and security gaps in your IT landscape in order to estimate your IT security status,

find detailed information on individual vulnerability sources in order to derive solutions,

view and explore devices where vulnerable software packages are installed on.

 

 

Screenshot 2024-04-08 103250

Vulnerabilities overview with list items

 

Screenshot 2024-04-08 100458

Details view of individual list item displaying the sources of potential security issues related to a specific software package installed in your  IT landscape

 

 

Screenshot 2024-04-08 105044

 

List of devices which a vulnerable software package is installed on under the Devices tab

 

Screenshot 2024-04-08 100654

 

List of vulnerable software packages which are affected by an individual vulnerability issue from the overview list

 

Screenshot 2024-04-08 111405

 

General application details on a software package which is affected by specific vulnerability issue, to be accessed under the Software tab