Finding Details

Required User Role: Basic, Scan Operator, Standard, Scan Manager, Administrator, or Custom Role

In the Findings view, you can view details for any finding in the list.

To view finding details:

  1. Access the Findings view.

  2. In the row of the finding for which you want to view details, click See details.

    The finding details page appears.

On the finding details page, you can:

  • View the name of the finding.

  • View the severity of the finding, for example, Critical.

  • View the state of the finding, for example, Active.

  • View the date and time at which the finding was last observed on the asset.

  • View an icon representing the source application(s) the finding's asset originated from.

    Tip: Hover over the icon to view the full application name.
  • View the Finding ID associated with the finding.

  • View the VPR of the finding.

    Tip: Click See in APA to navigate directly to the Top Attack Techniques page automatically filtered by the selected finding.
  • In the Detection Timeline section, view the following information about the finding:

    • Last Seen — The date on which the finding was last seen on an asset.

    • First Seen — The date on which the finding was first discovered on an asset.

    • Last Updated — The date on which the finding was last updated on the asset.

  • View a brief Solution that describes how you can remediate the finding.

  • View a list of Properties associated with the finding. These can include, but are not limited to:

    Note: The properties displayed in this section depend on the type of finding for which you are viewing details.
    • Finding ID — The ID number associated with the finding.

    • Detection ID — The ID number associated with the detection of the finding.

    • Active Finding Count — The number of active findings on the asset.

  • View a table list of the Weaknesses associated with the finding. This list includes the following information:

    • Weakness Name — The Common Vulnerability Exposure (CVE) ID associated with the weakness.

    • Type — The type of weaknesses: Misconfiguration or Vulnerability.

    • Severity — The severity of the weakness, for example, Critical.

      Note: At this time, Tenable Exposure Management does not include information for Info level severity weaknesses.
      Note: Because Tenable Exposure Management calculates CVEs using VPR and Tenable Cloud Security calculates using CVSS, you may notice a difference in severity across weaknesses between these applications.
    • VPR — The Vulnerability Priority Rating (VPR) of the weakness.

    • Description — A brief description of the weakness.

    • Impacted Assets — The number of assets impacted by the weakness. For more information, see Assets.

    • Sources — The application the weakness' asset originated from, for example, Tenable Vulnerability Management.

You can also manage the page in the following ways: