If you want to organize your daily tasks on our platform, our To do feature is your go-to tool. With this function, you can keep track of all vulnerabilities assigned to you, ensuring efficient monitoring of your daily tasks. Accessing it is simple: Click on the To do button in the top bar.
However, an initial question could be: How can we assign vulnerabilities to our team? Enter this link, and you will see how to do it!
Know your To do table
Role required: User, Vulnerability Manager or User Manager
The To do table provides a clear overview of vulnerabilities assigned to you, which you are responsible for resolving. This section displays the following information:
- Organization: The name of the organization where the specific vulnerability is identified.
- Group name: The name of the group containing the vulnerability, clicking on it redirects you to the Vulnerabilities section of the group.
- Type: The type of vulnerability. When you click on it, you are redirected to the description of that location.
- Vulnerability: Indicates where the vulnerability is located.
- Evidence: Clicking on View will redirect you to the Evidence section of the type of vulnerability.
- Last reattack: The Reattack status requested in the list of vulnerabilities assigned to the user.
- Severity: Severity level based on the CVSS.
- Tags: The tags that were defined at the time of assigning the vulnerability.
Edit Treatment
Role required: Vulnerability Manager or User Manager
Members with the User role can assign fix work to themselves and edit the External BTS, Tags and Level values. To edit the Treatment, you must select it in the check box on the left of the vulnerability in question and then click Edit button.
A pop-up window will appear for you to edit the vulnerability. You can modify fields such as Treatment, Assigned and other related details here. To save the changes you have made, click the Confirm button.
Please keep in mind that any changes you make will trigger notifications. Note that the editing options are based on your assigned role. To gain a better understanding of roles, click here.
Request a reattack
Role required: User, Vulnerability Manager or User Manager
You can perform the Reattack action in the Locations and To do sections. Remember that a reattack is when you have already applied a solution for an existing vulnerability and you want to validate its effectiveness. To perform a reattack from the To do section, you have to select which vulnerability you want to validate by clicking on the check box on the left and then the Reattack button.
A pop-up window will appear asking you for the justification you applied in the solution; remember that this justification is composed of 10 or more characters. When you have typed the validation, click on the Confirm button.
Here this vulnerability enters in Requested status awaiting for the verification of its solution. We invite you to enter here to understand the status of the reattacks and their validation procedure.
Filter To do table
Role required: User, Vulnerability Manager or User Manager
Filters are one of the features found throughout our platform, helping us to analyze data quickly. The filters in this section are located on the right side next to the search bar.
Here you can filter by Organization, Group name, Type, Last reattack, Severity and Tags. Note that you must set clear filters since the filter you apply will be maintained until you change any of these.
Refresh To do table
Role required: User, Vulnerability Manager or User Manager
If you need to refresh the To do table view, you can do so with the button on the right next to the reattack button.
Search the To do table
Role required: User, Vulnerability Manager or User Manager
The search bar filters the information contained in the columns of the table.