Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • Protected: How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • Protected: How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • Implementing Benchmark Compliance Rules in Azure
      • Implementing PCI DSS 3 2 1 Regional in AWS
      • Implementing CIS 3 0 0 in AWS
      • Implementing HIPAA HITRUST Rules
      • Implementing PCI DSS 3 2 1 Global Rules in AWS
      • Implementing NIST 800 53 rev 5 Global Rules in AWS
      • Implementing SecPod Global Rules in AWS
      • Implementing CIS 3 0 0 Regional in AWS
      • Implementing CIS 4 0 0 Regional
      • Implementing SOC 2 in AWS
      • Implementing CIS 4 0 0 in AWS
      • Implementing NIST 800 53 rev 5 Rules in AWS
      • Implementing SecPod Regional Rules in AWS
      • Implementing SecPod Default Rules in AWS
      • Implementing NIST 800 53 rev 5 Regional in AWS
      • Implementing PCI DSS 3 2 1 in AWS
      • Implementing CIS 4 0 0 Global in AWS
      • Implementing CIS 3 0 0 Global Rules in AWS
      • Implementing SOC 2 Global Rules in AWS
      • Implementing SOC 2 Regional Rules in AWS
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner CM
      • How to align with NIST 800-53 security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with PCI security compliance management?
      • How to custom create a security policy?
      • How to run a compliance scan?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to investigate DNS cache on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to collect all software licenses in Windows systems?
      • How to collect environment variables set in all operating systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect all software licenses in Mac systems?
      • How to collect DNS information on Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to delete and quarantine a file?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Windows systems?
      • How to perform system tuning?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to check wireless security in Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to collect all the important missing patches in Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check password policy set in Windows systems?
      • How to collect all security events from Windows Events Log?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner CVEM
  • Saner CVEM Products
  • Saner CVEM Unified Dashboard User Guide

Saner CVEM Unified Dashboard User Guide

Print Friendly, PDF & Email

Overview

SanerNow has a new interactive dashboard – Unified Dashboard – that provides a whole new representation of end-to-end vulnerability management through a unified console. The Unified Dashboard paints a clear and concise picture of your organization’s security posture, covering Visibility, Detection, Prioritization, and Remediation all in one console.

Unified Dashboard aims to ease your navigation between SanerNow tools and provide the necessary insights and recommendations to keep your organization secure. And this consolidated data is available at an Organization level and Account level.

Unified Dashboard

SanerNow Unified Dashboard provides information at the Organization and Account levels. The Organization level unified dashboard contains all the information of the Accounts within the organization. In comparison, an Account level Unified dashboard contains Account specific information.

The Unified Dashboard is divided into the following sections.

  1. Visibility
  2. Detection
  3. Prioritization
  4. Remediation

Visibility

Device Universe

The Device Universe section gives detailed information about the Assets in your Organization. At an Account level, the Device Universe section shows information about the Assets in an Account. For instance, the pie chart on the left side of the page represents the total number of devices in the Organization, classifying them depending on the family of operating systems they belong to and categorizing remote scanned devices as Network devices. At the same time, the Device Universe section gives a granular view by breaking down the Asset information as mentioned in the table below.

IconInformation Represented at Organization level / Account level
Shows the total number of active devices in the Organization / Account.
Shows the total number of inactive devices in the Organization / Account.
Shows the total number of newly added devices during the last one week in the Organization / Account.
Shows the total number of device groups in the Organization / Account.
Shows the total number of operating systems found in the Organization / Account.
Shows the total number of applications present in the Organization / Account.
Shows the total number of outdated applications present in the Organization / Account.
Shows the total number of blacklisted applications present in the Organization / Account.
Shows the total number of network subnets that exist in the Organization.
Shows the total number of user groups in the Organization / Account.
Important

For Blacklisted Applications to be visible in the Device Universe, the Organization should have an active subscription to the SanerNow Asset Exposure tool. Similarly, the Account should have an active subscription to SanerNow Asset Exposure to display blacklisted applications in the Account-level Device Universe section.

The Device Universe section at an Organization level provides account-wise information that can be downloaded into a CSV file. Click on any of the categories in the Device Universe section to download the information to a CSV file.

In addition to this, the Device Universe section at an Account level provides additional information. All you need to do is, click the number next to the icon in the Device Universe section, and a pop-up window showing all the details about the category is displayed. You can download the information presented in the pop-up window to a CSV file.

You can download the details by clicking the CSV icon on the top right of the pop-up window.

Cyber Hygiene Score

The Cyber Hygiene Score of the Organization is displayed to the right of the page. The Organization score is the weighted average of all the Accounts within the Organization. Clicking the metered icon takes you to the CHS Organization dashboard. Similarly, on an Account-level CHS dashboard, the account-specific CHS Score is displayed to the right of the page.

Detection

The Detection section categorizes the information provided by the SanerNow tools you subscribed to. The data is classified as follows:

  1. Category
  2. Risks
  3. Severity
  4. Trend
  5. Affected Devices
  6. Launch

The Detection section in an Org level dashboard displays the below-mentioned information.

Category –  This section lists the name of the SanerNow tools the Organization has subscribed to.

Risks – This section lists the total risks found by the respective SanerNow tool in the Organization.

Severity – This section categorizes the risks found into Low, Medium, High, and Critical categories based on severity.

Trend – This section shows the risks found over the past 90 days in a trending graph.

Affected Devices – This section categorizes the total devices in the Organization into affected and unaffected.

Launch –  This section contains the launch icon. Clicking this icon takes you to the Account-specific Unified Dashboard.

For instance, if you’ve subscribed to the SanerNow VM tool, the Unified Dashboard will display all the vulnerabilities found in each of the Accounts present in the Organization.

The VM section table displays the following information Account-wise.

  1. Account –  This column displays the name of the Account present in the Organization.
  2. Total Risks – This column displays each Account’s total number of vulnerabilities.
  3. Critical – This column displays each Account’s total number of vulnerabilities under the Critical category.
  4. High – This column displays each Account’s total number of vulnerabilities under the High category.
  5. Medium – This column displays each Account’s total number of vulnerabilities under the Medium category.
  6. Low – This column displays each Account’s total number of vulnerabilities under the Low category.
  7. Affected Devices – This column displays the count of devices affected by the vulnerability in red. At the same time, the unaffected devices are shown in green.
  8. Launch – Clicking the launch icon takes you to the Unified Dashboard for the respective Account.

Similarly, other SanerNow tools, namely CM, PA, and PM, will appear in the Detection section, displaying misconfigurations, posture anomalies, and missing patches information detected in the Organization.

Important

The number of SanerNow tools that appear in the Detection section will vary depending on your Organization’s subscription.

The Detection section in an Account level dashboard displays the same above information, but the scope remains confined to the Accounts within the Organization. For instance, clicking the Launch icon next to VM will take you to the dashboard for that particular Account.

Important

On the Account level Unified Dashboard, the Detection section will show all the SanerNow tools assigned to the Account by the Org Admin.

Prioritization

The Prioritization section contains two sections: Prioritized Risks funnel and Factors Influencing Risk Prioritization chart. The Prioritization section remains the same for Organization and Account level Unified dashboards but will display Organization-specific information on an Organization level dashboard. And for an Account level dashboard, the information specific to the Accounts within the Organization is shown.

Prioritized Risks

The Prioritized Risks funnel categorizes the risks found in your Organization as follows.

  • Track
  • Track*
  • Attend
  • Act

Track –  The risks under this category don’t require action now. You can continue to track and reassess the risks if new information becomes available – remediate Track risks within standard update timelines.

Track* – The risks under this category contain specific characteristics that may require closer monitoring for changes. Security teams must closely monitor these risks to track any new developments in this case – remediate Track* risks within standard update timelines.

Attend –  The risks under this category require attention from the Organization’s internal, supervisory-level individuals – remediate Attend risks within standard update timelines.

Act – The risks under this category require attention from the Organization’s internal, supervisory-level individuals – remediate Act risks as soon as possible.

Factors Influencing Risk Prioritization

The Factors Influencing Risk Prioritization chart categorizes the risks found in the Organization into the following categories.

  1. Risk on Mission Critical Devices
  2. High Exploitation
  3. Automatable
  4. Total Technical Impact

Risk on Mission Critical Devices –  The risks under this category exists on critical devices and must be immediately acted upon.

High Exploitation – The risks under this category can be easily exploited by bad actors.

Automatable –  The risks under this category can be automated by bad actors to exploit the devices in the Organization.

Total Technical Impact – The risks under this category give bad actors total control over the behavior of the software or provide complete disclosure of all information on the systems.

Note
On an Organization level dashboard, the Prioritization section will appear if your Organization has subscribed to the SanerNow Risk Prioritization tool. Similarly, at an Account level, SanerNow Risk Prioritization should be enabled for the Prioritization section to be visible on the Account level Unified Dashboard.

Remediation

The Remediation section contains two sections: Recommended Remediation for ACT Category and Remediation Actions.

Recommended Remediation

This section displays the risks that you need to remediate immediately.

Note
The Recommended Remediation will work only if SanerNow Risk Prioritization is enabled at an Organization and Account level.

The Remediation section in an Organization level Unified Dashboard with SanerNow Risk Prioritization looks similar to the screenshot below.

The following information about each Remediation on an Organization level Unified Dashboard is shown.

  1. The name of the vulnerable asset with relevant patch information.
  2. The name of the SanerNow tool used for remediation and the severity of the risk
  3. The name of the Account where the vulnerable asset exists.
  4. The name of the vendor providing the patch, its size, and the number of risks that will get remediated by applying the patch.

You can remediate the risks by clicking the Fix button. A pop-up window appears on the screen.

Fill in the task name and select a remediation schedule. You can choose the following scheduling options.

  1. Immediate
  2. After Scheduled Scan
  3. Custom date

Immediate – When you select the schedule as Immediate, the patch gets applied immediately.

After Scheduled Scan – When you select the schedule as After Scheduled Scan, the patch gets applied after SanerNow Agent performs the scheduled scan on the Account.

Custom Date –  When you select the schedule as Custom Date, you need to specify the Task Execution Date and the Task Start Window.

(Task start window is a time frame during which a task is allowed to start running. For example, a task might have a start window of 09:00 PM to 11:00 PM, which means the task can begin anytime within that time range. If the device is offline during the start time window, the Task is not executed and gets reported as Schedule Missed.)

Similarly, on an Account level Unified Dashboard, the Remediation section with SanerNow Risk Prioritization enabled looks like this.

The following information about each Remediation on an Account level Unified Dashboard is shown.

  1. The name of the vulnerable asset with relevant patch information.
  2. The name of the SanerNow tool used for remediation and the severity of the risk
  3. Number of devices affected in the Account by the risk
  4. The name of the vendor providing the patch, its size, and the number of risks that will get remediated by applying the patch.

You can remediate the risks by clicking the Fix button, which takes you to the Account-specific dashboard for the SanerNow tool.

However, if Risk Prioritization is not enabled, the top 10 recommended remediations from SanerNow PM and CM tool are displayed.

Note
If Risk Prioritization is not enabled for the Account, the remediation tasks listed under Recommended Remediation depend on the following conditions.
a. If both SanerNow PM and CM tools are enabled, the top 10 recommended remediation tasks from SanerNow PM and CM tools get listed under Recommended Remediation section.
b. If just the SanerNow PM tool is enabled for the Account, then the top 10 recommended remediation tasks from the SanerNow PM tool are listed under the Recommended Remediation section.
c. If just the SanerNow CM tool is enabled for the Account, then the top 10 recommended remediation tasks from the SanerNow CM tool are listed under the Recommended Remediation section.

Similarly, the last ten remediation Actions performed in the Account gets listed under the Remediation Actions section.

Remediation Actions

The Remediation Actions section displays all the remediation actions performed on the Accounts present in the Organization. You can see the Status of the Remediation Action – whether it is completed or is in the process of getting completed.

The following information about each remediation task listed under the Remediation Actions section is presented from left to right.

  1. The name of the SanerNow tool used to perform the Remediation Action.
  2. The name of the Account on which the remediation action was performed.
  3. The task name that was given to the remediation action.
  4. The status of the remediation action.

Similar information at an Account level is shown for the Remediation Actions section in the Account level Unified Dashboard.

The organization-level Saner Unified Dashboard lets you create remediation jobs for missing patches and misconfigurations for assets that belong to different accounts but belong to the same organization without accessing individual accounts pages.

Saner Org-level Unified Dashboard lists all the missing patches and misconfigurations from various accounts that belong to the same organization on a single page.

Performing Organization-Level Remediation

Viewing Missing Patches and Misconfigurations

Click the icon on the top of the Remediation section to access the Remediations page.

The Remediations page lists all the Missing Patches and Misconfigurations for all the accounts part of the selected organization.

On the top left of the Remediations page, you can choose between Missing Patches and Misconfigurations.

The Remediations page has multiple filters that allow you to filter missing patches and misconfigurations. The available filters are as follows:

  1. Accounts
  2. Family
  3. Type
  4. More Filters

The Accounts filter allows you to select the account(s) and view missing patches and misconfigurations for the selected account(s).

The Family filter lets you view missing patches and misconfigurations depending on the operating system. You can choose between Windows, Unix, and Mac.

The Type filter allows you to choose between OS, Third Party, and Feature Update patches from the missing patches listed on the Remediations page.

Besides the OS, Third Party, and Feature Update filters, additional filters exist in More Filters. They are as follows:

  1. Patch Group
  2. Severity
  3. Detected Date
  4. Released Date
Note
The filters, namely OS, Third Party, Feature Update, and Patch Group, are available only for missing patches and not misconfigurations.

The Patch Group filter allows you to choose between Security and Non-Security patches.

The Severity filter allows you to filter missing patches and misconfigurations depending on the severity level of each patch/misconfiguration. You can choose from the following severity values.

  1. Critical
  2. High
  3. Medium
  4. Low
  5. None

The Detection Date filter allows you to filter missing patches and misconfigurations based on the date Saner CVEM detected the missing patches and misconfigurations.

The Released Date filter allows you to filter patches and misconfigurations based on the date the vendor released the patches.

Saner Unified Dashboard lists all the missing patches and misconfigurations in a tabular format, providing detailed information about each patch.

FieldDescription
AssetThe name of the asset is displayed in the Asset column.
PatchThe missing patch file details are shown in the Patch column. If the patch details are unavailable, the link to the vendor’s site where the patch is available is displayed.
Patch GroupThe Patch Group column displays two values- Security and Non-Security. If it is a security patch, it is shown as Security. If it is a non-security patch, it is shown as Non-Security.
VendorThe vendor who provided the missing patch for the asset is shown under the Vendor column.
SizeThe size of the missing patch file is shown under the Size column.
DetectedThe date Saner CVWM detected the missing patch is shown under the Detected column.
ReleasedThe date the vendor released the missing patch is shown under the  Released column.
RebootThe Reboot column displays two values- True and False. If the machine requires a reboot after applying the patch, it is shown as True. If a reboot is not required, it is shown as False.
SeverityThe Severity column shows the severity of the patch. It can be Critical, High, Medium, Low, and None.
RollbackThe Rollback column displays two values- True and False. If the patch can be rolled back after installation, it is shown as True. Otherwise, it is displayed as False.
HostsThe Hosts column displays the number of devices on which the missing patch needs installation.
AccountThe Account column displays the number of accounts with assets requiring patching.

You can search for assets by entering the name in the Search assets search box next to the icon. Also, you can download the missing patches information into a CSV file by clicking theCSV icon.

Creating a Remediation Job for Missing Patches and Misconfigurations

Creating a remediation job for Missing Patches

The Remediations page lists all the assets and their missing patches in a tabular format.

1. Click the checkbox next to the assets to which you want to apply the missing patches.

2. Click the Apply Selected Patches button.

The Create Patching Task window appears.

The Task Impact pane displays the following information.

  • The total number of patches selected as part of the patching task.
  • The total number of devices on which the patches are getting deployed.
  • The total number of accounts to which selected devices for patching belong.

The Task Controls pane on the Creating Patching Task window lets you specify additional controls for a patching task.

  • Reboot Control: You can specify a reboot schedule for the patching task. You can select from the below options.
    • Do not reboot
    • Reboot automatically
    • Force reboot
    • Schedule date and time
  • Remediation End Time: You can specify the time frame for completing the patching task.
  • Patching Notification: You can specify a notification message before the patching activity begins. And a notification message when the patching activity ends.

3. Provide the following mandatory inputs to create a patching task. They are as follows:

  • Task Name   — You must provide the name of the selected patching task.
  • Remediation Schedule –- You can choose when you want SanerNow to apply the patches. SanerNow supports the below remediation schedule.
    • Immediate   — When you select the remediation schedule as Immediate, the patches are applied immediately.
    • After scheduled scan — When you select the remediation schedule as After scheduled scan, the patches are applied once the Saner Agent completes the scheduled scan.
    • Custom date —  When you select the remediation schedule as custom date, you must specify the date and the time frame during which you want Saner to apply the patches.

4. Click the Apply Selected Patches button. Saner creates the patching task.

Creating a remediation job for Misconfigurations

The Remediations page lists all the assets and their misconfiguration patches in a tabular format.

1. Click the checkbox next to the assets to which you want to apply the misconfiguration patches.

2. Click the Apply Selected Patches button.

The Create Patching Task window appears.

The Task Impact pane displays the following information.

  • The total number of misconfiguration patches selected as part of the patching task.
  • The total number of devices on which the patches are getting deployed.
  • The total number of accounts to which selected devices for patching belong.

The Task Controls pane on the Creating Patching Task window lets you specify additional controls for a patching task.

  • Reboot Control: You can specify a reboot schedule for the patching task. You can select from the below options.
    • Do not reboot
    • Reboot automatically
    • Force reboot
    • Schedule date and time
  • Remediation End Time: You can specify the time frame for completing the patching task.
  • Patching Notification: You can specify a notification message before the patching activity begins. And a notification message when the patching activity ends.

3. Provide the following mandatory inputs to create a patching task. They are as follows:

  • Task Name   — You must provide the name of the selected patching task.
  • Remediation Schedule –- You can choose when you want SanerNow to apply the patches. SanerNow supports the below remediation schedule.
    • Immediate   — When you select the remediation schedule as Immediate, the patches are applied immediately.
    • After scheduled scan — When you select the remediation schedule as After scheduled scan, the patches are applied once the Saner Agent completes the scheduled scan.
    • Custom date —  When you select the remediation schedule as custom date, you must specify the date and the time frame during which you want Saner to apply the patches.

4. Click the Apply Selected Patches button.

Saner creates the patching task.

Viewing Remediation Job Status

The Remediation Actions page lists all the patching tasks and their statuses in a tabular format, providing detailed information about each patching task.

FieldDescription
Task NameThe name given to the patching task is displayed in the Task Name column.
ModuleThe Saner module name to which the created patching task belongs is displayed in the Module column.
TypeThe patching job’s type is displayed in the Type column.
Created ByThe user who created the patching task is displayed in the Created By column.
Creation DateThe date on which the patching task was created is displayed in the Creation Date column.
StatusThe status of the patching task is displayed in the Status column. If the patch task is currently under progress, it is displayed as Ongoing. If the patching task is completed, it is displayed as Completed.
AccountsThe account(s) to which the devices on which the missing patches/misconfigurations were applied belonged is shown under the Accounts column.
ActionsIn the Actions column, you can view the overall patching task status. Also, you can delete a completed patching task.

You can search for patching tasks by entering the name in the search box next to the icon. Also, you can download the missing patches information into a CSV file by clicking theCSV icon.

Viewing Remediation Task Status

You can view detailed information about the remediation tasks on the Remediation Actions page.

Clicking the icon takes you to the Task Status page, where you can view the overall status for each the patching task presented in a tabular format.

FieldDescription
Host NameThe name of the host on which the patching task is getting performed is displayed in the Host Name column.
Last Updated TimeThe date and time Saner Agent performed activity on the device is displayed in the Last Updated Time column
Remediation TypeThe remediation schedule selected for the patching task is displayed in the Remediation Type column.
Overall StatusThe final status of the patching task is displayed in the Overall Status column.

The Task Details page provides detailed information about the patching task. The below details are presented on the Task Details page.

FieldDescription
Account NameThe account to which the device belongs on which the patching task is being carried out is displayed in the Account Name column.
Job TypeThe job type, whether it’s a PM or CM job, is displayed in the Job Type column.
OwnerThe name of the user who created the patching task is displayed in the Owner column.
Schedule TypeThe type of schedule specified for the patching task is displayed in the Schedule Type column.
Force RebootIf the device requires a force reboot as part of the patching task, the Force Reboot column displays True. If a force reboot is needed, it displays as False.
DevicesThe device’s hostname on which the patching task is being carried out is displayed in the Devices column.
Asset Patch DetailsThe details of the patch being applied as part of the remediation job is displayed in the Patch Details column.
Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Overview of Saner Continuous Vulnerability and Exposure ManagementSaner CVEM Asset Exposure User Guide
Table of Contents
  • Overview
  • Unified Dashboard
  • Visibility
    • Device Universe
  • Cyber Hygiene Score
  • Detection
  • Prioritization
    • Prioritized Risks
    • Factors Influencing Risk Prioritization
  • Remediation
  • Recommended Remediation
  • Remediation Actions
  • Performing Organization-Level Remediation
    • Viewing Missing Patches and Misconfigurations
    • Creating a Remediation Job for Missing Patches and Misconfigurations
      • Creating a remediation job for Missing Patches
      • Creating a remediation job for Misconfigurations
  • Viewing Remediation Job Status
  • Viewing Remediation Task Status
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x