Searching & Filtering
- Using the Vulnerability Management Explore page
- Using the Search Filters on the Vulnerability Management Explore page
- Date Syntax Searches: Simple date searches and relative date searches
- Simple and Complex Search Query Examples
- Cisco Vulnerability Management Search Terms
- Tokenized Search Terms
Guides
- Cisco Vulnerability Management Release Notes and Bug Fixes
- Getting Started with Cisco Vulnerability Management
- Using the Cisco Vulnerability Management Home Page
- How do I Create, Edit, and Delete a Risk Meter?
- Application Security Module
- Managing Application Name Changes in the Application Security Module
Cisco Vulnerability Management Basics
- Predicted Exploits
- Vulnerability Statuses
- Vulnerability Scoring in Cisco Vulnerability Management
- Navigating Groups in Vulnerability Management Explore
- Explore Page Column Descriptions
- Auto-Closing Vulnerabilities
Security Tool/Vulnerability Scanner Connectors
- Toolkit: Cylera Connector
- What is a connector? (API vs File-based)
- Connectors Index
- Managing Connectors
- Acunetix360 Connector
- AppSpider Connector Page (XML Connector, fka: NTO Spider)
Assets / Dashboards / Risk Meters
- Remediation Analytics and Scoring
- Using Threat Trends
- What is a Risk Meter?
- How is a risk meter score determined?
- General Guidelines when using vulnerability based Risk Meters
- Risk Meter Dashboard Overview
Webinars
- May 2023 Power User Webinar: Kenna vs Vulnerabilities - All Things Vulnerabilities
- April 2023 Power User Webinar: All About Assets
- February 2023 Power User Webinar: Kenna vs Vulnerabilities - What's the Score?
- November 2022 Power User Webinar: Benefits of a Kenna Health Check
- September 2022 Power User Webinar: To Allow or Not to Allow the Risk?
- August 2022 Power User Webinar: Fixology - The Data Science of Top Fixes