The platform's To do section is where you keep track of all vulnerabilities whose remediation has been assigned to you as well as the types that have the highest priority scores across all the groups you are a part of, therefore benefitting vulnerability management. To access this section, simply click the To do button located in the header.
To learn how to assign fix work to yourself, read the corresponding information in Assign treatments.
Know your Assigned locations table
Role required: User, Vulnerability Manager or User Manager
The table in the To do section provides a comprehensive overview of the vulnerabilities you are responsible for addressing.
This is the information provided in the table:
- Organization: The organization where the vulnerability was identified
- Group name: The group where the vulnerability is present (click on the group name to go to the Vulnerabilities section of that group)
- Type: The type of vulnerability in question (click on it to go to its dedicated section within the group)
- Vulnerability: The vulnerability's location
- Evidence: The link to the Evidence section of the type of vulnerability
- Last reattack: The status of the most recent reattack request for this vulnerability
- Severity: The severity level of the vulnerability, based on the Common Vulnerability Scoring System (CVSS)
- Tags: Any tags associated with the vulnerability during assignment
View the top ten vulnerabilities to prioritize
Role required: User, Vulnerability Manager or User Manager
To do has a Priority fixes section that shows you the ten most important types of vulnerabilities to remediate across all the groups of which you are a member. This top ten is constructed according to the total Priority score of these security issues. This score takes into account (a) the root Priority, (b) prioritization policies, (c) Priority units assigned to individual vulnerabilities, and (d) a default score calculated with the formula (4^(CVSS-4)) / 4.096.
The Location column shows the selected individual vulnerability with the highest Priority score within the type of vulnerability. Click on it to
see inside the vulnerability.
Edit vulnerabilities in your to-do list
Role required: User, Vulnerability Manager or User Manager
Members with the User role can assign fix work to themselves and edit the External BTS, Tags and Priority values.
To edit a vulnerability in the to-do list, follow these steps:
- Go to the To do section.
- In the table, select the checkbox on the left of the vulnerability in question.
- Click the Edit button.
- Make the necessary changes in the form. Only Vulnerability Managers and User Managers can modify the values of Treatment and Assigned. (For descriptions of the fields, read Assign treatments.)
- Click on Confirm to apply the changes.
Any changes made trigger notifications to members subscribed to them.
Request a reattack
Role required: User, Vulnerability Manager or User Manager
After fixing your code to remediate a vulnerability, you can request a reattack to verify the effectiveness of your fix. You can ask for reattacks from the Locations and To do sections.
Here are the steps to perform a reattack from the To do section:
- In the To do section, select the vulnerability that you addressed.
- Click the Reattack button.
- In the pop-up window, provide a justification for the reattack request (minimum 10 characters).
- Click on Confirm to send the request.
Filter the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
Filtering allows you to quickly refine the displayed vulnerabilities based on specific criteria. To access the options, click on Filters.
To clear an applied filter, simply click on the X next to it.
Refresh the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
To update the displayed vulnerabilities and reflect any recent changes, therefore having your pending tasks list up to date, click the Update table button.
Search the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
The search bar filters the information by showing only the rows of the table that match your search.
Use the Cancel button
Role required: User, Vulnerability Manager or User Manager
If you interrupted the process of requesting a reattack, the Cancel button becomes available, replacing the edit option while you remain in the To do section. Simply click it to reveal the Edit button again.
Free trial