Finding Details

Required User Role: Basic, Scan Operator, Standard, Scan Manager, Administrator, or Custom Role

In the Findings view, you can view details for any finding in the list.

To view finding details:

  1. Access the Findings view.

  2. In the row of the finding for which you want to view details, click See details.

    The finding details page appears.

On the finding details page, you can:

  • View the name of the finding.

  • View the severity of the finding, for example, Critical.

  • View the state of the finding, for example, Active.

  • View the date and time at which the finding was last observed on the asset.

  • View an icon representing the source application(s) the finding's asset originated from.

    Tip: Hover over the icon to view the full application name.
  • View the Finding ID associated with the finding.

  • View the VPR of the finding.

    Tip: Click See in APA to navigate directly to the Top Attack Techniques page automatically filtered by the selected finding.
  • In the Detection Timeline section, view the following information about the finding:

    • Last Seen — The date on which the finding was last seen on an asset.

    • First Seen — The date on which the finding was first discovered on an asset.

    • Last Updated — The date on which the finding was last updated on the asset.

  • View a brief Solution that describes how you can remediate the finding.

  • View a list of Properties associated with the finding. These can include, but are not limited to:

    Note: The properties displayed in this section depend on the type of finding for which you are viewing details.
    • Finding ID — The ID number associated with the finding.

    • Detection ID — The ID number associated with the detection of the finding.

    • Active Finding Count — The number of active findings on the asset.

  • View a table list of the Weaknesses associated with the finding. This list includes the following information:

    • Weakness Name — The Common Vulnerability Exposure (CVE) ID associated with the weakness.

    • Type — The type of weaknesses: Misconfiguration or Vulnerability.

    • Severity — The severity of the weakness, for example, Critical.

      Note: At this time, Tenable Exposure Management does not include information for Info level severity weaknesses.
      Note: Because Tenable Exposure Management calculates CVEs using VPR and Tenable Cloud Security calculates using CVSS, you may notice a difference in severity across weaknesses between these applications.
    • VPR — The Vulnerability Priority Rating (VPR) of the weakness.

    • Description — A brief description of the weakness.

    • Impacted Assets — The number of assets impacted by the weakness. For more information, see Assets.

    • Sources — The application the weakness' asset originated from, for example, Tenable Vulnerability Management.

You can also manage the page in the following ways:

Export One or More Tabs from the Finding Details Page

Required User Role: Administrator or Custom Role

You can export data from any table-based tab within the finding details page, which allows for easy data sharing amongst your team.

Note: You cannot export data from non table-based tabs on the finding details page.

To export data from the finding details page:

  1. In the upper-right corner of the page, click Export.

    The Export window appears.

  2. (Optional) In the File Name text box, type a new name for the export file.

  3. In the Formats section, select the radio button for the format in which you want to export the data.

  4. In the Pages to export section, select the check box next to each table-based tab whose data you want to include in the export file.

  5. Click Export.

    Tenable Exposure Management downloads the export file to your computer. Depending on your browser settings, your browser may notify you that the download is complete.