Finding Details
In the Findings view, you can view details for any finding in the list.
To view finding details:
-
Access the Findings view.
-
In the row of the finding for which you want to view details, click See details.
The finding details page appears.
On the finding details page, you can:
-
View the name of the finding.
-
View the severity of the finding, for example, Critical.
-
View the state of the finding, for example, Active.
-
View the date and time at which the finding was last observed on the asset.
-
View an icon representing the source application(s) the finding's asset originated from.
Tip: Hover over the icon to view the full application name. -
View the Finding ID associated with the finding.
-
View the Vulnerability Priority Rating (VPR) of the finding.
Tip: ClickSee in APA to navigate directly to the Top Attack Techniques page automatically filtered by the selected finding.
-
In the Detection Timeline section, view the following information about the finding:
-
Last Seen — The date on which the finding was last seen on an asset.
-
First Seen — The date on which the finding was first discovered on an asset.
-
Last Updated — The date on which the finding was last updated on the asset.
-
-
View a brief Solution that describes how you can remediate the finding.
-
View a list of Properties associated with the finding.
These can include, but are not limited to:
Note: The properties displayed in this section depend on the type of finding for which you are viewing details.-
Finding ID — The ID number associated with the finding.
-
Detection ID — The ID number associated with the detection of the finding.
-
Active Finding Count — The number of active findings on the asset.
-
-
View a table list of the Weaknesses associated with the finding.
This list includes the following information:
-
Weakness Name — The Common Vulnerability Exposure (CVE) ID associated with the weakness.
-
Type — The type of weaknesses: Misconfiguration or Vulnerability.
-
Severity — The severity of the weakness, for example, Critical.
Note: At this time, Tenable Exposure Management does not include information for Info level severity weaknesses.Note: Because Tenable Exposure Management calculates CVEs using VPR and Tenable Cloud Security calculates using CVSS, you may notice a difference in severity across weaknesses between these applications. -
VPR — The Vulnerability Priority Rating (VPR) of the weakness.
-
Description — A brief description of the weakness.
-
Impacted Assets — The number of assets impacted by the weakness. For more information, see Assets.
-
Sources — The application the weakness' asset originated from, for example, Tenable Vulnerability Management.
-