The platform's To do section is where you keep track of all vulnerabilities whose remediation has been assigned to you as well as the types that have the highest priority scores across all the groups you are a part of, therefore benefitting vulnerability management. To access this section, simply click the To do button located in the header.
To learn how to assign fix work to yourself, read the corresponding information in Assign treatments.
Know your Assigned locations table
Role required: User, Vulnerability Manager or User Manager
The table in Assigned locations within the To do section provides a comprehensive overview of the vulnerabilities you are responsible for addressing.
This is the information provided in the table:
- Organization: The organization where the vulnerability was identified
- Group name: The group where the vulnerability is present (click on the group name to go to the Injected section of that group)
- Type: The type of vulnerability in question (click on it to go to its dedicated section within the group)
- Vulnerability: The vulnerability's location
- Evidence: The link to the Evidence section of the type of vulnerability
- Last reattack: The status of the most recent reattack request for this vulnerability
- Severity: The severity level of the vulnerability, based on the Common Vulnerability Scoring System (CVSS)
- Tags: Any tags associated with the vulnerability during assignment
View the top vulnerabilities to prioritize
Role required: User, Vulnerability Manager or User Manager
To do has a Priority section that shows you the 50 most important types of vulnerabilities to remediate across all the groups of which you are a member. This top 50 is constructed according to the total Priority score of these security issues. This score takes into account (a) the root Priority, (b) prioritization policies, (c) Priority units assigned to individual vulnerabilities, and (d) a default score calculated with the formula (4^(CVSS-4)) / 4.096.
This is the information provided in the table:
- Location: The file path where this vulnerability type was found
- Group name: The group where the vulnerability is present
- Vulnerability: The type of vulnerability in question
- Priority score: The significance of remediating each vulnerability
- Treatment: The defined treatment for the vulnerability:
- Untreated: The vulnerability treatment assignment is due
- In progress: A member of your team has been assigned the remediation of the vulnerability
- Temporarily accepted: The vulnerability is accepted until a defined date
- Permanently accepted: The vulnerability is accepted indefinitely
Use the Filters option to limit the information in the table by Treatment.
- Assignee: The individual assigned to address the vulnerability
- Report date: The date the vulnerability was reported
Edit vulnerabilities in your to-do list
Role required: User, Vulnerability Manager or User Manager
Members with the User role can assign fix work to themselves and edit the External BTS, Tags and Priority values.
To edit a vulnerability in the to-do list, follow these steps:
- Go to the To do section.
- In the table, select the checkbox on the left of the vulnerability in question.
- Click the Edit button.
- Make the necessary changes in the form. Only Vulnerability Managers and User Managers can modify the values of Treatment and Assigned. (For descriptions of the fields, read Assign treatments.)
- Click on Confirm to apply the changes.
Any changes made trigger notifications to members subscribed to them.
Request a reattack
Role required: User, Vulnerability Manager or User Manager
After fixing your code to remediate a vulnerability, you can request a reattack to verify the effectiveness of your fix. You can ask for reattacks from the Locations and To do sections.
Here are the steps to perform a reattack from the To do section:
- In the To do section, select the vulnerability that you addressed.
- Click the Reattack button.
- In the pop-up window, provide a justification for the reattack request (minimum 10 characters).
- Click on Confirm to send the request.
Filter the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
Filtering allows you to quickly refine the displayed vulnerabilities based on specific criteria. To access the options, click on Filters.
To clear an applied filter, simply click on the X next to it.
Refresh the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
To update the displayed vulnerabilities and reflect any recent changes, therefore having your pending tasks list up to date, click the Update table button.
Search the Assigned locations table
Role required: User, Vulnerability Manager or User Manager
The search bar filters the information by showing only the rows of the table that match your search.
Role required: User, Vulnerability Manager or User Manager
If you interrupted the process of requesting a reattack, the Cancel button becomes available, replacing the edit option while you remain in the To do section. Simply click it to reveal the Edit button again.
See events across your groups
Role required: Vulnerability Manager or User Manager
The Events section in To do provides key details on situations that are hindering security testing in the groups you manage. This space gives you a holistic view, allowing you to manage and respond to events effectively, especially when supervising multiple groups.
Filter events
Role required: Vulnerability Manager or User Manager
You can use the Filters option to easily find the events you are looking for.
Export events
Role required: Vulnerability Manager or User Manager
Click on the Export button to download the contents of the table in a CSV (comma-separated values) file.
Free trial