IVR Dashboard

The IVR Dashboard provides a real-time overview of the organization's exposure to security vulnerabilities, categorized by severity. It supports both CVSS (Common Vulnerability Scoring System) and VPR (Vulnerability Priority Rating) scoring systems, allowing teams to analyze and prioritize remediation efforts effectively.

Configure

To look at the details of your datasource, click on the Configure button. You also have the option to add a new datasource. To add new datasource, click on the Create datasource button. Refer to Creating new datasource for more information on how to add new datasource.

Datasource status meaning:

  • New: Datasource was added and is awaiting data ingestion.
  • Finished: Data has been successfully retrieved and is now visible in IVR.
  • Running:
Edit datasource
  • Choose Edit from Actions to reopen the input form.

  • It is required to re-enter both Access Key and Secret Key, even if unchanged.

Delete datasource
  • Choose Delete from Actions to remove the data source entry.

Overview

Critical Severity Exposures by (CVSS / VPR)

This bar chart displays the number of vulnerabilities with critical severity. The chart supports two scoring filters:

  • CVSS:Common Vulnerability Scoring System

  • VPR:Vulnerability Priority Rating

Current view is filtered by CVSS.

Severity Breakdown by (CVSS / VPR)

The chart provides a summary distribution of all identified vulnerabilities by severity level. It offers a quick glance at the risk landscape.

Current view is filtered by CVSS.

Top 10 Vulnerabilities

The Top 10 Vulnerabilities chart provides a time-based visual representation of the most significant vulnerabilities tracked within a specified period.

Export charts

To export charts click download icon in the upper right corner and choose preferred format: JPEG, PNG or PDF.

List

Tenable Vulnerability table

This table represents a list of detected vulnerabilities, allowing users to review and manage individual vulnerability instances in a structured and actionable format. Table Functionality of the table:
  • Selection Mechanism:

    Each row includes a checkbox that allows users to select one or more vulnerabilities. A master checkbox at the top enables bulk selection. Selected vulnerabilities can be targeted for remediation by clicking the Remediate button.

  • Filter Option:

    A filter icon is available in the top-left area of the table, allowing users to refine the list based on specific criteria (e.g., ID, CVE ID, published date).

The table includes the following columns:

  • Tenable Vulnerability. To see vulnerability details, click on the vulnerability. You will be able to see:

    • This includes a brief summary, a detailed description, and a solution for the specific vulnerability. You can also fix the vulnerability from here. Click Remediate and follow the steps given in the IVR Remediate flow page.
    • Contents show the Fixlets that are related to this specific vulnerability. Click on Fixlet to go to Fixlet details page.
    • Devices show the device that the specific Fixlet can be applied to. Click on Devices to go to Device Details page.
    • Deployment shows the deployment data. To learn how to deploy the Fixlet, go to Deploying Fixlets page.
  • ID: a unique identifier for each vulnerability

  • VPR: Vulnerability Priority Rating. Values include Low, Medium, High, and Critical.

  • CVSS: Common Vulnerability Scoring System.

  • CVE IDs: lists the Common Vulnerabilities and Exposures (CVE) identifiers associated with the vulnerability

  • Published: shows the publication date of the vulnerability

  • Tenable Count: indicates the number of instances or assets affected by the specific vulnerability within the environment

Export charts

To export the table click download icon in the upper right corner and choose preferred format: CSV or Excel.