Setting up IVR v.4.0.0 app

This section provides information on setting up the IVR application, remediation from the main vulnerability list page, remediation from the Vulnerability page, and exporting the vulnerability list.

Setting up IVR v.4.0.0 app

To set up the IVR v.4.0.0 app, performo the following steps:

  1. Upgrade the IVR to the latest WebUI version.
  2. After a successful on-prem setup and starting ivrNext.exe, wait for the automation process to complete. The process will be confirmed by a log entry stating 'Automation completed'.
  3. Log in to the WebUI App with valid credentials.
  4. Once on the default page, navigate to the IVR app by selecting it from the Apps dropdown menu in the navigation bar.

  5. Upon successful completion of the automation process, the data will be visible in the grid as shown in the snapshot below.

Remediation from the main vulnerability list page

  1. You can now select vulnerabilities to remediate. Once a vulnerability checkbox is selected, the "Remediate" option will be enabled, as shown in the image below.

  2. Click Remediate to get redirected to the Remediate Vulnerabilities page to select the content.
  3. On the page shown below, you can select the content and then click Next.

  4. Choose the appropriate action and click Next to proceed.

  5. Select the target machine for vulnerability remediation and click Next to continue.

  6. Configure the deployment schedule and select preferred options before clicking the Deploy button to initiate the process.

  7. The final screen allows you to monitor the deployment process.

Remediation from the Vulnerability page

  1. Click on any vulnerability from the vulnerability list page.

  2. You will be directed to the vulnerability information page, as shown in the snapshot below.

    Here, you can view the content, devices, and deployments for the selected vulnerability.

  3. Click on the Remediate button, as shown in the snapshot below.

  4. You will be redirected to the Remediate Vulnerabilities page to select the content. Select the content and then click Next.

  5. Choose the appropriate action and click Next to proceed.

  6. Select the target machine for vulnerability remediation and click Next to continue.

  7. Configure the deployment schedule and select preferred options before clicking the Deploy button to start the process.

  8. The final screen provides an overview of the deployment process.

Export the vulnerability list

To export the vulnerability list, click on the Export button on the vulnerability information page.

In the export dropdown, enter a name in the input area, select the desired options, and choose the file format. The file will be exported in the selected format.

Below is the example of the exported CSV file.