Setting up WebUI IVR v.4 app

This section provides information on setting up the IVR application, remediation from the main vulnerability list page, remediation from the Vulnerability page, and exporting the vulnerability list.

Set up the WebUI IVR v.4

To set up the WebUI IVR v.4 app, perform the following steps:

  1. Upgrade the IVR to the latest WebUI version.
  2. After a successful on-prem setup and starting ivrNext.exe, wait for the automation process to complete. The process will be confirmed by a log entry stating 'Automation completed'.
  3. Log in to the WebUI App with valid credentials.
  4. Once on the default page, navigate to the IVR app by selecting it from the Apps dropdown menu in the navigation bar.

  5. Upon successful completion of the automation process, the data will be visible in the grid as shown in the snapshot below.

    Note: The scanner count indicates the number of devices detected with the vulnerability by the external scanner. In contrast, the content page displays the devices that are relevant to the fixlet.

Remediation from the main vulnerability list page

  1. You can now select vulnerabilities to remediate. Once a vulnerability checkbox is selected, the "Remediate" option will be enabled, as shown in the image below.

  2. Click Remediate to get redirected to the Remediate Vulnerabilities page to select the content.
  3. On the page shown below, you can select the content and then click Next.

  4. Choose the appropriate action and click Next to proceed.

  5. Select the target machine for vulnerability remediation and click Next to continue.

  6. Configure the deployment schedule and select preferred options before clicking the Deploy button to initiate the process.

  7. The final screen allows you to monitor the deployment process.

Remediation from the vulnerability page

  1. Click on any vulnerability from the vulnerability list page.

  2. You will be directed to the vulnerability information page, as shown in the snapshot below.

    Here, you can view the content, devices, and deployments for the selected vulnerability.

  3. Click on the Remediate button, as shown in the snapshot below.

  4. You will be redirected to the Remediate Vulnerabilities page to select the content. Select the content and then click Next.

  5. Choose the appropriate action and click Next to proceed.

  6. Select the target machine for vulnerability remediation and click Next to continue.

  7. Configure the deployment schedule and select preferred options before clicking the Deploy button to start the process.

  8. The final screen provides an overview of the deployment process.

Export the vulnerability list

To export the vulnerability list, click on the Export button on the vulnerability information page.

In the export dropdown, enter a name in the input area, select the desired options, and choose the file format. The file will be exported in the selected format.

Below is the example of the exported CSV file.

Universal Vulnerability Ingestion (UVI) – File Import

The Universal Vulnerability Ingestion (UVI) – File Import feature enables users to import vulnerability reports into the IVR application using Tenable or generic CSV files. The process includes file upload, column mapping, data verification, and integration into the IVR system for analysis and reporting. Users can also manage imported data by deleting or updating reports as needed. Refer to the Universal Vulnerability Ingestion (UVI) – File Import to learn more about this feature.

Device Centric view

The Device Centric view displays vulnerabilities associated with each device after data import. Users can access detailed device information, view applicable patches, vulnerabilities, and deployments, and initiate remediation actions directly from WebUI IVR app. Refer to Device Centric view to learn more about this feature.