Vulnerabilities report

5 March 2024

ID 166189

This report displays software vulnerabilities detected on managed devices. The report includes the following columns:

  • Severity level. Vulnerability severity level.
  • Vendor. Vendor of the application in which the vulnerability is detected.
  • Application. Application in which the vulnerability is detected.
  • Application version. Version of the application in which the vulnerability is detected.
  • Device. Device on which the vulnerability is detected.
  • Vulnerability name. Name of the detected vulnerability. This name is received from the security application.
  • Object. The object in which the vulnerability is detected. For example, if the vulnerability is detected in a file, this column contains the path to the file.
  • Detection time. Time of the vulnerability detection.
  • Updates are available. Whether patches that fix the vulnerability are available.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.