Managing found vulnerabilities
If the vulnerability assessment was performed at least once and some vulnerabilities were found, you can see them in Software management > Vulnerabilities. The list of vulnerabilities shows both vulnerabilities for which patches are available, and those without suggested patches. You can use the filter to show only vulnerabilities with available patches.
Name | Description |
---|---|
Name |
The name of vulnerability. |
Affected products |
Software products for which the vulnerabilities were found. |
Machines |
The number of affected machines. |
Severity |
The severity of found vulnerability. The following levels can be assigned according to the Common Vulnerability Scoring System (CVSS):
|
Patches |
The number of appropriate patches. |
Published |
The date and time when the vulnerability was published in Common Vulnerabilities and Exposures (CVE). |
Detected |
The first date when an existing vulnerability was detected on machines. |
You can find the description of a found vulnerability by clicking its name in the list.
To start the vulnerability remediation process
- In the Cyber Protect web console, go to Software management > Vulnerabilities.
- Select the vulnerabilities in the list, and then click Install patches. The vulnerability remediation wizard will open.
- Select the patches to be installed. Click Next.
- Select the machines on which you want to install patches.
-
Choose whether to reboot the machines after patch installation:
- No – reboot will never be initiated after patch installation.
- If required – reboot is initiated only if it is required for applying the updates.
- Yes – reboot will be always initiated after patch installation. However, you can specify a delay.
Do not reboot until backup is finished – if a backup process is running, the machine reboot will be delayed until the backup completes.
-
Click Install patches.
As a result, the selected patches are installed on the selected machines.