Kaspersky Industrial CyberSecurity for Networks

Viewing risk details when working with the devices table

March 22, 2024

ID 194183

When working with the devices table you can view information about the risks that were detected on devices. The names of detected vulnerabilities (identified as CVE IDs or other identification numbers of the vulnerabilities) are displayed for each device that contains Vulnerability risks. If risks of other categories were detected on a device, the names of these risk categories are displayed for this device. The names of vulnerabilities and risk categories are displayed in the Risks column and in the details area when a device is selected.

By default, the devices table displays information only for the risks that are assigned the Active status. If necessary, you can enable the display of information about all risks by selecting the Show remediated and accepted risks check box when configuring the devices table.

To designate the severity levels of risks, the names of vulnerabilities and categories are displayed in one of the following colors:

  • Red designates High severity risks.
  • Yellow designates Medium severity risks.
  • Blue designates Low severity risks.

For risks with the Active status, the names are brightly colored. For risks with the Remediated or Accepted status, the names are faintly colored.

If risks of the same category are associated with a device, the name of this category is shown in the color of the highest severity level of all these risks.

If you want to view detailed information about risks, you can use the displayed names of vulnerabilities and risk categories. Click the name of a vulnerability (displayed as a CVE ID or other identification number of the vulnerability) to open the details window of the vulnerability. When you click the name of a risk category, the application switches to the risks table and applies a filter to display risks of the selected category that are associated with the device.

When viewing the devices table, you can configure the settings for filtering devices based on their associated risks. You can also search for devices based on the names of their vulnerabilities (identified as CVE IDs or other identification numbers of the vulnerabilities).

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.