Skip to main content

Device Vulnerability Scanning

Overview

Device Vulnerabilities provides continuous vulnerability scanning across your device fleet. Identify CVEs, prioritize remediation, and track patching progress.

How Scanning Works

Scan Process

  1. Software Inventory

    Agent collects installed software and versions.

  2. CVE Matching

    Software matched against vulnerability databases.

  3. Risk Scoring

    Vulnerabilities scored by severity and exploitability.

  4. Reporting

    Results displayed in dashboard with remediation guidance.

Data Sources

SourceCoverage
NVDNational Vulnerability Database
CVECommon Vulnerabilities and Exposures
Vendor AdvisoriesMicrosoft, Apple, Linux distros
Exploit DBKnown exploits

Vulnerability Dashboard

Key Metrics

MetricDescription
Total VulnerabilitiesUnique CVEs across fleet
Affected DevicesDevices with vulnerabilities
Critical/HighHigh-severity issues
ExploitableKnown exploit available

Vulnerability List

View all vulnerabilities:

  • CVE ID and description
  • Severity (CVSS score)
  • Affected software
  • Device count
  • Remediation status

Severity Scoring

CVSS Scores

ScoreSeverityPriority
9.0-10.0CriticalImmediate
7.0-8.9HighWithin 48 hours
4.0-6.9MediumWithin 2 weeks
0.1-3.9LowScheduled patching

Additional Factors

Beyond CVSS, consider:

FactorImpact
Known ExploitIncreases priority
Internet FacingHigher risk
Critical SystemHigher priority
Compensating ControlsMay reduce priority

Viewing Vulnerabilities

By Vulnerability

See all devices affected by a specific CVE:

  1. Click on vulnerability
  2. View affected devices
  3. See software versions
  4. Access remediation guidance

By Device

See all vulnerabilities on a specific device:

  1. Go to DevicesDevice List
  2. Select device
  3. Go to Vulnerabilities tab
  4. View all CVEs for that device

By Software

See all vulnerabilities for a software package:

  1. Go to VulnerabilitiesSoftware
  2. Select software
  3. View CVE history
  4. See affected versions

Remediation

Remediation Actions

ActionDescription
PatchUpdate to fixed version
UpgradeMove to new major version
RemoveUninstall vulnerable software
MitigateApply compensating controls
AcceptDocument risk acceptance

Remediation Workflow

  1. Assess

    Review vulnerability details and impact.

  2. Plan

    Determine remediation approach.

  3. Test

    Test patch/update in non-production.

  4. Deploy

    Roll out remediation to affected devices.

  5. Verify

    Confirm vulnerability is resolved.

Tracking Progress

Track remediation status:

StatusMeaning
OpenNot addressed
In ProgressBeing remediated
ResolvedSuccessfully remediated
AcceptedRisk accepted

Automation

Auto-Patching

Enable automatic patching for:

  • Operating system updates
  • Browser updates
  • Common applications
  • Security patches

Patch Windows

Configure maintenance windows:

  1. Go to SettingsPatch Windows
  2. Define allowed update times
  3. Set restart policies
  4. Configure user notifications

Exclusions

Excluding Vulnerabilities

When a vulnerability doesn't apply:

  1. Select vulnerability
  2. Click Exclude
  3. Choose exclusion type:
    • Global (all devices)
    • Device-specific
    • Temporary (with expiration)
  4. Document reason

Exclusion Management

Review and manage exclusions:

  • List all exclusions
  • Expiration dates
  • Justifications
  • Re-enable as needed

Reporting

Vulnerability Reports

Generate reports showing:

  • Summary - Overview of vulnerability status
  • Trend - Changes over time
  • By Software - Most vulnerable applications
  • By Device - Devices needing attention
  • SLA - Time to remediation metrics

Compliance Evidence

Vulnerability management provides evidence for:

FrameworkRequirement
SOC 2CC7.1
ISO 27001A.12.6.1
HIPAA§164.308(a)(5)

Alerts

Alert Configuration

Set up alerts for:

Alert TypeTrigger
New CriticalCritical CVE discovered
Exploit AvailableExploit published for CVE
SLA BreachVulnerability exceeds SLA
RegressionPreviously fixed, now present

Best Practices

Prioritize Ruthlessly

Focus on critical/high with known exploits first. Don't try to fix everything at once.

Maintain Patch Cadence

Regular patching prevents vulnerability buildup. Monthly at minimum.

Test Before Deploying

Patches can break things. Test in non-production first.

Track SLAs

Set and track remediation SLAs. Critical within 48 hours, High within 2 weeks.

Next Steps