Risk Meter Reporting

Risk Meter reports visualize your trending risk over time. As soon as a Risk Meter or Asset Group is created in Cisco Vulnerability Management, nightly captures of data begin to create the metric displayed in the report. To access a report, click on the Reporting button in the bottom left-hand corner of any Risk Meter on the Dashboard. 

All items in the reports are updated during nightly jobs except for the following items which present live data: Mean time to Remediate, New Vulnerabilities Found, and Total Closed Vulnerabilities.

Note: If you edit the search query for a Risk Meter, you might see changes in asset and vulnerability counts in the reports. Also, if you delete a risk meter, you will delete all historical data previously collected for that meter. 

The Risk Group Overview section shows general counts and captures Risk Group scores over time and a vulnerability density count. Use the "Export PDF" link at the top of this section to download a PDF version of the full report. In the bottom right-hand corner, you will see the True Risk score if you have accepted  risk for any vulnerabilities in this group. 

Screen_Shot_2019-08-02_at_11.22.39_AM.png

In the right-hand corner above the Risk Timelines table, you can select a timeline to apply to the entire report. By default, the reports show activity for the last 30 days. 
When you hover over the lines on any timeline graphs, the specific numbers recorded for that day on the timeline display. 

The Current Risk Information ensures visibility into High Risk assets and vulnerabilities even if the Risk Score for the Group has been reduced to an Amber rating or lower. 

You can click many elements on the report to drill down into the details for that item. 

New and Closed vulnerabilities are calculated using live data, but are restricted by the date range set for the reporting page. As assets go inactive, tags change, and vulnerabilities are reopened (some scanners) these numbers might change.
Mean Time To Remediate is often used to evaluate the efficiency of vulnerability remediation efforts and to confirm teams are meeting set SLAs. It is calculated using the found_on and closed dates that the scanner provides, and a straight average of the difference between the 2 days grouped by risk. 

The final graphs highlight the risk and vulnerability details of the asset group over time. 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.