Monitor and investigate vulnerable traffic flows

Do one of all of the following to monitor and investigate vulnerable traffic flows in your network. Vulnerable traffic flows are flows associated with the ports (on assets) that Nessus Scanner or ColorTokens Scanner found open and scanned and found vulnerabilities. 

See the vulnerabilities on an asset

  • Click an asset on the Assets page.

  • Click the Security tab in the fly panel.

  • In the Security on open ports listing, click a port to see the complete list of CVEs on the port in the Vulnerability details pop-up.

    You will see the CVE IDs, CVSS scores, and the names and descriptions of the vulnerabilities on the port.


Investigate vulnerable flows in your network

Use Flow Explorer to see the details of all the traffic flows on ports that Nessus Scanner or ColorTokens Scanner found vulnerable to attacks.

Flow Explorer reports list the CVSS base score of the highest vulnerability found on the asset that had vulnerable flows.

  1. Go to Information Center > Flow Explorer.

  2. Click Show Advanced Filter and select Vulnerable in the Unsafe Flows tile.

  3. Click Search.

  4. Click + at the top of the table and select CVSS.

  5. Scroll to the right to see the CVSS column.

  6. To download the details of the vulnerable flows as a CSV file, click the Download icon at the top of the table.

Monitor the overall status of the vulnerabilities on HUD Dashboard

See the ratings on the Workload vulnerability widget on the HUD Dashboard frequently, to identify and remediate vulnerable assets immediately. 

Currently, you cannot drill-down to a filtered view of vulnerable assets from the widget. However, ensure that you check your assets and either shield them from vulnerabilities or put them in quarantine mode until you fix the vulnerabilities.

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.