Kaspersky Industrial CyberSecurity for Networks

Choosing vulnerabilities in the vulnerabilities table

March 22, 2024

ID 201939

In the vulnerabilities table, you can select vulnerabilities to view their information and manage these vulnerabilities. When vulnerabilities are selected, the details area appears in the right part of the web interface window.

To select the relevant vulnerabilities in the table, perform one of the following actions:

  • If you want to select one vulnerability, select the check box next to the vulnerability or click on the vulnerability.
  • If you want to select multiple vulnerabilities, select the check boxes next to the relevant vulnerabilities or select them while holding down the CTRL or SHIFT key. When multiple vulnerabilities are selected, the application checks the state of the selected vulnerabilities and determines whether there are remediated and accepted vulnerabilities among the selected vulnerabilities.
  • If you want to select all vulnerabilities that satisfy the current filter and search settings, perform one of the following actions:
    • Select any vulnerability in the table and press the key combination CTRL+A.
    • Select the check box in the title of the left-most column of the table.

When multiple vulnerabilities are selected, the details area shows the total number of selected vulnerabilities. If you selected all vulnerabilities that satisfy the current filter and search settings, one of the following values appears in the details area:

  • The precise number is displayed if you selected 2000 vulnerabilities or fewer. In this case, the application checks the state of the selected vulnerabilities just as with other methods for selecting multiple vulnerabilities.
  • If more than 2000 vulnerabilities are selected, the number 2000+ is displayed. In this case, the application does not check the state of the selected vulnerabilities.

The title of the left-most column of the table shows the vulnerability selection check box. Depending on the number of selected vulnerabilities, the check box can have one of the following states:

  • icon_empty_flag – all vulnerabilities that satisfy the current filter and search settings were not selected in the table. However, one vulnerability or multiple vulnerabilities may be selected in the table by using the check boxes next to the vulnerabilities or by using the CTRL or SHIFT key.
  • icon_checked_flag – all vulnerabilities that satisfy the current filter and search settings were selected in the table.
  • icon_empty_flag – all vulnerabilities that satisfy the current filter and search settings were selected in the table, but then the check boxes for some of the vulnerabilities were cleared. This state is also retained if the check boxes were cleared for all vulnerabilities selected in this way (due to the fact that the number of selected vulnerabilities may change).

If all vulnerabilities that satisfy the filter and search settings are selected, the number of selected vulnerabilities may be automatically changed. For example, as a result of the user's actions during another connection session or when new vulnerabilities are discovered. We recommend that you configure filtering and search parameters so that you only see the desired vulnerabilities in the selection.

See also:

Configuring Interaction Control

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.