1

Configurations

Ashwani

Last Update 4 months ago

Introduction

The Settings module allows users to configure system preferences, thresholds, and other settings for effective management.

CPR (Context Prioritization Rating) Settings
1. Purpose:
The CPR settings allow administrators to prioritize vulnerabilities based on different scoring models like EPSS, CVSS, and CISA KEV.
2. Steps to Configure:
  • Navigate to the Settings menu from the user profile dropdown in the top-right corner of the screen.
  • Under Configurations, select Preferences.
  • Adjust the sliders for:
    1. EPSS: To prioritize based on Exploit Prediction Scoring System.

    2. CVSS: To assign priority based on Common Vulnerability Scoring System.

    3. CISA KEV: To prioritize based on vulnerabilities listed by CISA.

  • Click Save to apply changes.
SLA Threshold Settings
1. Purpose:
Configure Service Level Agreement thresholds to define timelines for addressing vulnerabilities based on severity levels.
2. Steps to Configure:
  • In the Preferences section, scroll down to SLA Threshold Settings.
  • Set values (in days) for:
    1. Critical: Enter the number of days to address critical vulnerabilities.

    2. High: Define SLA for high-severity vulnerabilities.

    3. Medium: Specify SLA timelines for medium-severity vulnerabilities.

    4. Low: Configure SLA for low-priority vulnerabilities.

  • Click Save to update the SLA thresholds.
Archives and Revisions

1. Purpose:

Manage archived vulnerabilities and maintain version control over configurations or policies.

2. Steps to Configure Archives:

  • Navigate to the Archives section in Configurations.

  • Click on Add Archives to archive any vulnerabilities.

  • Click Save to confirm the changes.

  • Enable or disable the Show archive data in reports toggle in Preferences section to include or exclude archived vulnerabilities in all product reports.

3. Steps to Configure Revisions:

  • Navigate to the Revisions section in Configurations.

  • Click on Add Revision to add any revised vulnerabilities.

  • Restore or manage revisions as required.

Was this article helpful?

0 out of 0 liked this article

Still need help? Message Us