Threat Resolution

In "Threat Resolution", the user can manage and resolve the threats found during the scans.

Below are the available features:

Schedule Scan

Configure a new scan schedule for the targets. Follow these steps:

  1. Define a name for the schedule.

  2. Set the frequency (One-Time Execution, Daily, Weekly, Monthly, or Annually).

  3. Set the next execution (Date and Time).

  4. Select the targets.

  5. Finally, click "Confirm Scheduling".

Search and Filters

In the upper-right corner of the screen, the following resources are available to help you search for Schedules:

  • Search: Click on the magnifying glass icon to open the search field. Type the name of the threat and press Enter to locate it.

  • Filters: Click on "Filters" to refine the search with the following options:

    • Threat Name: Enter the name of the threat and press Enter to locate it.

    • Threat Type: Select the type (Info, Low, Medium, High, or Critical). By default, the filter is set to "All."

    • Domain: Select the desired domain.

    • Status: Choose between All, Resolved, and Pending.

    • Threats: Choose between Active and Silenced.

You can also filter the Threat Type using the options displayed on the left side of the screen.

After filling out or selecting the filters, simply click "Apply". If you want to remove the filters, click "Clear Filters".

Refresh

The "Refresh" button allows you to check for new changes immediately, without waiting for the next automatic update.

Threat Panel

The top panels show the number of threats by status:

  • Active Threats: Threats that are active and require immediate action.

  • Resolved Threats: Threats that have been resolved and no longer pose risks.

  • Silenced Threats: Threats that have been silenced and are no longer being monitored.

Threat Analysis: Target Resolution | Active

In this section, you can view all the identified threats and direct the necessary actions to manage them. The information is presented with the following details:

  • Status: Indicates the current status of the threat (Resolved or Pending).

  • Threat: Name of the detected threat.

  • Target: Target associated with the threat.

  • Type: Severity level of the threat (Info, Low, Medium, High, or Critical).

  • Created at: Number of days since creation.

  • Fast Actions: Choose one of the following options:

    • Accept Risks

    • Mark as False Positive

    • Add Mitigation Controls

    • How to solve? Use AI to resolve the target. By clicking this option, our AI will assist in resolving the target.

Silence Vulnerability When clicking on one of the last three options in the quick actions menu, the "Silence Vulnerability" screen is displayed.

Fill in the following fields to silence a target:

  • Reason: Enter the reason for silencing the target.

  • Justification: Select the appropriate justification (Accept Risks, Mitigated, or False Positive).

  • Silencing Period: Choose the desired period.

After filling in the fields, click "Silence".

Last updated