- play_arrow What's New for Users in JSA Vulnerability Manager 7.4.0
- play_arrow Installations and Deployments
- Installations and Deployments
- Vulnerability Backup and Recovery
- Ports Used for Communication Between JSA and JSA Vulnerability Manager Managed Hosts
- Options for Moving the Vulnerability Processor in Your JSA Vulnerability Manager Deployment
- Options for Adding Scanners to Your JSA Vulnerability Manager Deployment
- JSA Vulnerability Manager High-availability Scans
- Extending the JSA Vulnerability Manager Temporary License Period
- JSA Vulnerability Manager High-availability Scans
- play_arrow Vulnerability Scanning Strategy and Best Practices
- Vulnerability Scanning Strategy and Best Practices
- Scan Policy Types
- Scan Duration and Ports Scanning
- Tune Your Asset Discovery Configuration
- Tune Your Asset Discovery Performance
- Web Application Scanning
- Scanner Placement in Your Network
- Dynamic Scanning
- Network Bandwidth for Simultaneous Asset Scans
- Network Interface Cards on Scanners
- Vulnerability Management for Asset Owners
- Vulnerability Scan Notifications
- Triggering Scans of New Assets
- Configuring Environmental Risk for an Asset
- External Scanning FAQs
- play_arrow Scan Configuration
- play_arrow False Positives Management
- play_arrow Authenticated Patch Scans
- play_arrow Scanning on Windows-based Assets
- Scanning on Windows-based Assets
- Configuring an Authenticated Scan Of the Windows Operating System
- Remote Registry
- Enabling Remote Registry Access to Assets on the Windows Operating System
- Assigning Minimum Remote Registry Permissions
- Configuring WMI
- Setting Minimum DCOM Permissions
- Setting DCOM Remote Access Permissions
- Administrative Shares
- Enabling Administrative Shares
- Disabling Administrative Shares
- Manually Configuring NTLMv2 Authentication to Prevent Scan Failures
- play_arrow Vulnerability Exception Rules
- play_arrow Scan Investigations
- Scan Investigations
- Searching Scan Results
- Including Column Headings in Asset Searches
- Managing Scan Results
- Republishing Scan Results
- Asset Risk Levels and Vulnerability Categories
- Asset, Vulnerability, and Open Services Data
- Viewing the Status Of Asset Patch Downloads
- Vulnerability Risk and PCI Severity
- Troubleshooting Scan Issues
- Emailing Asset Owners When Vulnerability Scans Start and Stop
- play_arrow Management Of Your Vulnerabilities
- Management Of Your Vulnerabilities
- Common Vulnerability Scoring System (CVSS)
- Investigating Vulnerability Risk Scores
- Custom Risk Classification
- Searching Vulnerability Data
- Vulnerability Instances
- Network Vulnerabilities
- Asset Vulnerabilities
- Open Service Vulnerabilities
- Investigating the History Of a Vulnerability
- Reducing the Number Of False Positive Vulnerabilities
- Investigating High Risk Assets and Vulnerabilities
- Prioritizing High Risk Vulnerabilities by Applying Risk Policies
- Configuring Custom Display Colors for Risk Scores
- Identifying the Patch Status Of Your Vulnerabilities
- Removing Unwanted Vulnerability Data
- Configuring Vulnerability Data Retention Periods
- play_arrow Vulnerability Remediation
- play_arrow Vulnerability Reports
- play_arrow Scanning New Assets That Communicate with the Internet
- Scanning New Assets That Communicate with the Internet
- Creating an Asset Saved Search for New Assets
- Creating an On-demand Scan Profile
- Creating a Policy Monitor Question to Test for Internet Communication
- Monitoring Communication Between New Assets and the Internet
- Configuring an Offense Rule to Trigger a Scan
- play_arrow Security Software Integrations
- play_arrow IBM Security SiteProtector Integration
- play_arrow Vulnerability Research, News, and Advisories
- play_arrow JSA Vulnerability Manager Engine for OpenVAS Vulnerability Tests
Vulnerability Management Dashboard
You can display vulnerability information on your JSA dashboard.
JSA Vulnerability Manager is distributed with a default vulnerability dashboard so that you can quickly review the risk to your organization.
You can create a new dashboard, manage your existing dashboards, and modify the display settings of each vulnerability dashboard item.
For more information about dashboards, see the Juniper Secure Analytics Users Guide for your product.
Reviewing Vulnerability Data on the Default Vulnerability Management Dashboard
You can display default vulnerability management information on the JSA dashboard.
The default vulnerability management dashboard contains risk, vulnerability, and scanning information.
You can configure your own dashboard to contain different elements like saved searches.
Click the Dashboard tab.
On the toolbar, in the Show Dashboard list, select Vulnerability Management.
Creating a Customized Vulnerability Management Dashboard
In JSA you can create a vulnerability management dashboard that is customized to your requirements.
Click the Dashboard tab.
On the toolbar, click New Dashboard.
Type a name and description for your vulnerability dashboard.
Click OK.
On the toolbar select Add Item >Vulnerability Management and choose from the following options:
If you want to show default saved searches on your dashboard, select Vulnerability Searches.
If you want to show website links to security and vulnerability information, select Security News, Security Advisories, or Latest Published Vulnerabilities.
If you want show information that is about completed or running scans, select Scans Completed or Scans In Progress.
Creating a Dashboard for Patch Compliance
Create a dashboard that shows the most effective patch to use to remediate vulnerabilities that are found on the network.
Click the Dashboard tab.
On the toolbar, click New Dashboard.
Type a name and description for your vulnerability dashboard.
Click OK.
On the toolbar, select Add Item >Vulnerability Management >Vulnerability Searches and choose the default saved search that you want to show on your dashboard.
On the header of the new dashboard item, click the yellow Settings icon.
Select Patch from the Group By list and then select one of the following options from the Graph By list:
If you want to see how many assets need to a have the patch applied, select Asset Count.
If you want to see the cumulative risk score by patch, select Risk Score.
If you want to see the number of vulnerabilities that are covered by a patch, select Vulnerability Count.
Click Save.
To view vulnerability details on the Manage Vulnerabilities >By Vulnerability page on the Vulnerabilities tab, click the View in By Vulnerability link at the bottom of the dashboard item.