Assessing vulnerabilities can help reduce risk in your environment. You view the full context of any individual vulnerability that exists on an asset, how it impacts your environment, including risk score details, and perform remediation.
- If you do not have Container Security feature enabled, click Vulnerabilities in the left navigation pane.
- If you have Container Security feature enabled, navigate to in the left navigation pane.
Vulnerability data for newly added virtual machines (VMs), endpoints, and EC2 instances to your inventory typically collects within minutes, but under certain circumstances it can take up to 24 hours. Vulnerability data is not collected for VMs identified as non-persistent or short-lived Virtual Desktop Infrastructure (VDI) clones. These clones exist less than 24 hours and are therefore difficult to patch before they are spun down. The Vulnerability Management solution assesses golden images from which clones are deployed and persistent clones which exist for 24 hours or more. When new clones are deployed from a clean and up-to-date golden image, they contain the latest patches that address known vulnerabilities.
To view all vulnerabilities for your VM workloads, endpoints, or EC2 instances, click Vulnerabilities from the left navigation pane of the Carbon Black Cloud console, and select the associated tab.
VM workloads, endpoints, and EC2 instances can have multiple vulnerabilities, each with a different risk score. Based on this score, vulnerabilities are filtered on the level of severity - critical, important, moderate, or earlier. The higher the risk score, the later the severity.
The Vulnerabilities page shows the count of all vulnerabilities across all assets - operating systems (OS), apps, and versions.