Thursday, April 18 | 12 PM EDT / 6 PM CEST

Action1 5 Documentation 5 Detect Vulnerabilities

Detect Vulnerabilities

Action1 detects vulnerabilities and security issues in the software installed on your managed endpoints and helps you address them in accordance with your company security and patching policy. 

Tip: Make sure you connected your endpoints to Action1 Cloud. Check out the Endpoints view to see your networked workstations and servers.

Vulnerabilities on Dashboard

Navigate to the Dashboard to get an bird’s eye view of your endpoint health state. Check Vulnerability Redimiation Compliance and Vulnerability Remediation Deadlines dashboards to get an overview of your compliance status, see the number of CVEs that need your attention and the remediation timeframe which is defined by your corporate service -level agreements. See Configure SLAs

For tips on how to leverage these dashboards in your corporate governance routines, see Dashboard.

Compliance reports - Vulnerabilities

Vulnerabilities View

Navigate to the Vulnerabilities view to see all detected common vulnerabilities and exposures (CVEs).  Action1 lists vulnerabilities to non-OS software such as browsers, messengers, and administration tools. To see pending Windows updates, go to the Update Approval page.

Vulnerabilities view

Action1 provides a complete reference for each vulnerability such as its identifier, CVSS score, the date it was published, and the product it was reported for. The CVE identifier includes the year the issue was found and its number in the NIST National Vulnerability Database, e.g., CVE-2023-4073. The CVSS score which can be between 0 and 10 is determined based on a variety of factors such as attack complexity, exploitability, and impact on your infrastructure.

Expand the vulnerability details to see affected endpoints, compromised products, and even more details, including the vector, attack complexity, and a link to the NIST National Vulnerability Database.

Vulnerabilities with details