The risks table is displayed in the Risks section of the application web interface.
The settings of risks are displayed in the following columns of the table:
Name of the risk category.
Name of the risk. The CVE ID of the detected vulnerability is used for a Vulnerability risk (if it has no CVE ID, it is identified by its identification number obtained from other publicly available resources containing vulnerability descriptions).
For a Vulnerability risk: CVE ID of the detected vulnerability. This column is displayed in the risks table in Kaspersky Industrial CyberSecurity for Networks version 4.0.1.
For a Vulnerability risk: vulnerability ID in the BDU database. If one vulnerability with a CVE ID matches multiple vulnerabilities with different IDs in the BDU database, this column contains all of these IDs. This column is displayed in the risks table in Kaspersky Industrial CyberSecurity for Networks version 4.0.1.
Unique ID of the risk.
Calculated value of the risk assessment. The severity of the risk is designated by a numerical score. Depending on the severity, the score may have one of the following colors:
For risks with the Active status, the score is brightly colored. For Remediated or Accepted risks, its score is faintly colored.
Address information of one of the sides of network interaction (indicated for certain risk types). MAC addresses and IP addresses can be individually enabled and disabled. If additional address spaces were added to the application, you can enable or disable the display of the names of address spaces by using the Show address spaces setting when configuring the devices table.
Address information of the other side of network interaction (indicated for certain risk types). The display of address information can be configured the same way as the Side 1 column.
Name of the group containing the device with the detected risk (contains the name of the group and the names of all its parent groups).
Device name and address.
For a Vulnerability risk: name of the source of the information uploaded to the database of known vulnerabilities.
Current status of the risk. The following statuses are available:
Date and time of risk detection.
Date and time of the last change of the risk status.
For a Vulnerability risk: descriptions of devices from the database of known vulnerabilities. These are descriptions that match device information in the devices table.
When viewing the risks table, you can use the configuration, filter, search, and sorting functions.
Page top