Kaspersky Security Center

Exporting the list of software vulnerabilities to a file

1 July 2024

ID 183983

You can download the displayed list of vulnerabilities as a CSV or TXT file. You can send these files to your information security manager or store them for purposes of statistics.

To export the list of software vulnerabilities detected on all managed devices to a text file:

  1. In the main menu, go to Operations → Patch management → Software vulnerabilities.

    A list of software vulnerabilities in the applications detected on managed devices is displayed.

    By default, only vulnerabilities displayed on the current page are exported.

    If you want to export only specific vulnerabilities, select the check boxes next those vulnerabilities.

  2. Click the Export to TXT or Export to CSV button, depending on the format you prefer. If any of these buttons is not visible, click the ellipsis button, and then select the required option from the drop-down list.

A file containing the list of software vulnerabilities is downloaded to your device.

To export the list of software vulnerabilities detected on the selected managed device:

  1. In the main menu, go to Assets (Devices)Managed devices.

    The list of managed devices is displayed.

  2. In the list of managed devices, click the link with the name of the device for which you want to view detected software vulnerabilities.

    The properties window of the selected device is displayed.

  3. In the properties window of the selected device, select the Advanced tab.
  4. In the left pane, select the Software vulnerabilities section.

    The list of software vulnerabilities detected on the selected managed device is displayed.

    By default, only vulnerabilities displayed on the current page are exported.

    If you want to export only specific vulnerabilities, select the check boxes next to those vulnerabilities.

  5. Click the Export to TXT or Export to CSV button, depending on the format you prefer. If any of these buttons is not visible, click the ellipsis button, and then select the required option from the drop-down list.

A file containing the list of software vulnerabilities is downloaded to your device.

See also:

Scenario: Finding and fixing third-party software vulnerabilities

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.