Configurations
Ashwani
Last Update 4 months ago
Introduction
The Settings module allows users to configure system preferences, thresholds, and other settings for effective management.
The CPR settings allow administrators to prioritize vulnerabilities based on different scoring models like EPSS, CVSS, and CISA KEV.
2. Steps to Configure:
- Navigate to the Settings menu from the user profile dropdown in the top-right corner of the screen.
- Under Configurations, select Preferences.
- Adjust the sliders for:
EPSS: To prioritize based on Exploit Prediction Scoring System.
CVSS: To assign priority based on Common Vulnerability Scoring System.
CISA KEV: To prioritize based on vulnerabilities listed by CISA.
- Click Save to apply changes.

Configure Service Level Agreement thresholds to define timelines for addressing vulnerabilities based on severity levels.
2. Steps to Configure:
- In the Preferences section, scroll down to SLA Threshold Settings.
- Set values (in days) for:
Critical: Enter the number of days to address critical vulnerabilities.
High: Define SLA for high-severity vulnerabilities.
Medium: Specify SLA timelines for medium-severity vulnerabilities.
Low: Configure SLA for low-priority vulnerabilities.
- Click Save to update the SLA thresholds.

1. Purpose:
Manage archived vulnerabilities and maintain version control over configurations or policies.
2. Steps to Configure Archives:
Navigate to the Archives section in Configurations.
Click on Add Archives to archive any vulnerabilities.
Click Save to confirm the changes.
Enable or disable the Show archive data in reports toggle in Preferences section to include or exclude archived vulnerabilities in all product reports.
3. Steps to Configure Revisions:
Navigate to the Revisions section in Configurations.
Click on Add Revision to add any revised vulnerabilities.
Restore or manage revisions as required.

