IVR Dashboard
The IVR Dashboard provides a real-time overview of the organization's exposure to security vulnerabilities, categorized by severity. It supports both CVSS (Common Vulnerability Scoring System) and VPR (Vulnerability Priority Rating) scoring systems, allowing teams to analyze and prioritize remediation efforts effectively.
Configure

To look at the details of your datasource, click on the Configure button. You also have the option to add a new datasource. To add new datasource, click on the Create datasource button. Refer to Creating new datasource for more information on how to add new datasource.

Datasource status meaning:
- New: Datasource was added and is awaiting data ingestion.
- Finished: Data has been successfully retrieved and is now visible in IVR.
- Running:
-
Choose Edit from Actions to reopen the input form.
-
It is required to re-enter both Access Key and Secret Key, even if unchanged.
-
Choose Delete from Actions to remove the data source entry.
Overview

Critical Severity Exposures by (CVSS / VPR)

This bar chart displays the number of vulnerabilities with critical severity. The chart supports two scoring filters:
-
CVSS:Common Vulnerability Scoring System
-
VPR:Vulnerability Priority Rating
Current view is filtered by CVSS.
Severity Breakdown by (CVSS / VPR)

The chart provides a summary distribution of all identified vulnerabilities by severity level. It offers a quick glance at the risk landscape.
Current view is filtered by CVSS.
Top 10 Vulnerabilities

The Top 10 Vulnerabilities chart provides a time-based visual representation of the most significant vulnerabilities tracked within a specified period.
Export charts
To export charts click download icon in the upper right corner and choose preferred format: JPEG, PNG or PDF.

List

Tenable Vulnerability table
-
Selection Mechanism:
Each row includes a checkbox that allows users to select one or more vulnerabilities. A master checkbox at the top enables bulk selection. Selected vulnerabilities can be targeted for remediation by clicking the Remediate button.
-
Filter Option:
A filter icon is available in the top-left area of the table, allowing users to refine the list based on specific criteria (e.g., ID, CVE ID, published date).
The table includes the following columns:
-
Tenable Vulnerability. To see vulnerability details, click on the vulnerability. You will be able to see:
- This includes a brief summary, a detailed description, and a solution for the specific vulnerability. You can also fix the vulnerability from here. Click Remediate and follow the steps given in the IVR Remediate flow page.
- Contents show the Fixlets that are related to this specific vulnerability. Click on Fixlet to go to Fixlet details page.
- Devices show the device that the specific Fixlet can be applied to. Click on Devices to go to Device Details page.
- Deployment shows the deployment data. To learn how to deploy the Fixlet, go to Deploying Fixlets page.
-
ID: a unique identifier for each vulnerability
-
VPR: Vulnerability Priority Rating. Values include Low, Medium, High, and Critical.
-
CVSS: Common Vulnerability Scoring System.
-
CVE IDs: lists the Common Vulnerabilities and Exposures (CVE) identifiers associated with the vulnerability
-
Published: shows the publication date of the vulnerability
-
Tenable Count: indicates the number of instances or assets affected by the specific vulnerability within the environment
Export charts
To export the table click download icon in the upper right corner and choose preferred format: CSV or Excel.
