Managing risks
Display additional information
To view additional information on a specific misconfiguration, find it in the grid and click anywhere on the row it is located on to display the Additional information panel.
The panel displays different information, based on the type of risk and the related information currently available:
Risk mitigation (fixing risks)
Risk mitigation involves taking action to remediate the source of the detected vulnerability. This may involve actions such as changing settings, updating software, modifying policies, changing passwords, and more.
There are several ways you can resolve a risk:
Automatic mitigation - You can use this option to create a task that will automatically make the necessary modifications to fix the issue. This option is available only for Misconfigurations.
Manual mitigation - This option needs to be performed manually. Specific threats needs actions taken that can not be automated. The steps required to fix the risk can be found in the Additional information side panel, under the Risk mitigation section.
Patch app - This option automatically updates the app to the latest available version that fixes the vulnerability.
For this option to be available, the following requirements must be met:
Your license must include access to the Patch Management feature.
The endpoint where the risk was detected must have the Patch Management module installed.
The endpoint where the risk was detected must have a policy installed that has the Patch Management feature enabled.
An update must be available that includes a fix for the detected vulnerability.
Important
After fixing a risk, a new scan may not immediately reflect the update. It can take up to an hour for the changes to be accurately detected.
Ignoring risks
If there are certain risks that you feel cannot be resolved at the moment, you can temporarily remove them from the list of displayed risks to reduce the clutter. Doing this will also remove from the risk from the data processed by the Risk Management Dashboard.
You can do this using one of these methods:
Find the risk using one of the Risk Management pages.
Select the corresponding checkbox under the first column on the right side of the page. You can select multiple risks.
Click the State button on the top of the list and select Ignore threat.
Alternatively, you can click the Ignore threat button found in the Additional information panel, under the Risk mitigation section.
Note
You can reverse this action by repeating the process, selecting the Restore ignored risks option instead.
Working with Watchlists
Watchlists are default smart views that start off as empty and provide you with a way of tracking high priority risks. Each page under the Risk Management section has it's own watchlist.
To add a risk to a watchlist follow these steps:
Find the risk using one of the Risk Management pages.
Select the corresponding checkbox under the first column on the right side of the page. You can select multiple risks.
Click the Watchlist button on the top of the list and select Add to watchlist.
Alternatively, you can click the Add to watchlist button found in the Additional information panel, under the General section.
Note
You can reverse this action by repeating the process, selecting the Remove from watchlist instead.
To view a watchlist, click the Watchlist option under the Default section in the Smart views panel.