In the vulnerabilities table, you can select vulnerabilities to view their information and manage these vulnerabilities. When vulnerabilities are selected, the details area appears in the right part of the web interface window.
To select the relevant vulnerabilities in the table, perform one of the following actions:
When multiple vulnerabilities are selected, the details area shows the total number of selected vulnerabilities. If you selected all vulnerabilities that satisfy the current filter and search settings, one of the following values appears in the details area:
2000+ is displayed. In this case, the application does not check the state of the selected vulnerabilities.The title of the left-most column of the table shows the vulnerability selection check box. Depending on the number of selected vulnerabilities, the check box can have one of the following states:
– all vulnerabilities that satisfy the current filter and search settings were not selected in the table. However, one vulnerability or multiple vulnerabilities may be selected in the table by using the check boxes next to the vulnerabilities or by using the CTRL or SHIFT key.
– all vulnerabilities that satisfy the current filter and search settings were selected in the table.
– all vulnerabilities that satisfy the current filter and search settings were selected in the table, but then the check boxes for some of the vulnerabilities were cleared. This state is also retained if the check boxes were cleared for all vulnerabilities selected in this way (due to the fact that the number of selected vulnerabilities may change).If all vulnerabilities that satisfy the filter and search settings are selected, the number of selected vulnerabilities may be automatically changed. For example, as a result of the user's actions during another connection session or when new vulnerabilities are discovered. We recommend that you configure filtering and search parameters so that you only see the desired vulnerabilities in the selection.