Ask Us Anything
With our Field CTO and Technical Product Engineers

This Wednesday | 11 AM EDT / 5 PM CEST

Getting Started

Endpoints

Patch Management

Vulnerability Management

Software Deployment & IT Assets

Automation & Remote Desktop

Real-Time Reports & Alerts

Account Access & Management

SSO Authentication

Security Concerns

Need Help?

Action1 5 Documentation 5 Vulnerability Management

Vulnerability Management

 

Reports in this folder help you track and remediate unresolved vulnerabilities affecting your managed endpoints. Use them to examine vulnerabilities and their attributes in detail, including severity, status, vulnerable software, and documented compensating controls.

Navigate to Real-Time Reports & Alerts | Built-in Reports | Vulnerability Management.

Vulnerability Summary

This report provides a comprehensive snapshot of unresolved vulnerabilities throughout your Action1 organization. It displays their key properties, including CVE, CVSS score, CISA KEV, published date, vulnerable software, remediation status, and number of affected endpoints.

Click on the number in the Endpoints field to view the endpoint name and operating system for each affected endpoint, as well as vulnerable software and its version.

Tip: With Expand details set to Yes, the vulnerable software version will also be displayed.

Hardware Summary report

All Critical Vulnerabilities

This report offers an up-to-date listing of critical vulnerabilities across all managed endpoints, available at a glance. Report fields are similar to those in the summary report, but only the vulnerabilities having Critical severity are included.

Known Exploited Vulnerabilities

Review the list of known exploited vulnerabilities from the CISA KEV catalog, currently affecting your endpoints. Report fields are similar to those in the summary report, but only the vulnerabilities listed in the CISA KEV catalog are included.

Documented Compensating Controls

This report lists compensating controls (e.g., policies or network adjustments) applied manually to mitigate vulnerabilities without software patching. You can discover who applied each control and when.

Physical memory report

Use Tools in the top-right corner to see additional actions.

  • Each report you can export as CSV or HTML.
  • To receive a report on a regular basis, select Subscribe. To learn more, see Scheduling Reports Delivery.
  • Choose Create Alert to receive instant notifications on changes. To learn more, see Alerts.
  • If interested in customizing a report, Clone it first.

For example, if you want to enrich the report with additional data fields, Clone the report, follow the Custom Report wizard, and at the Columns step, add the ones you need.

Physical memory report

Additional fields that you can use when creating custom reports on vulnerability management include:
Attack Vector, Published Date, Impact Score, Exploitability Score, Remediation Deadline, More Details (link to NVD), Access Vector, Access Complexity, Authentication, Confidentiality Impact, Integrity Impact, Availability Impact.

See also: Custom Reports