DeepSurface: Vulnerability Instances

Documentation
Installation Guide
Overview
Let DeepSurface Host For You
Getting Started
System Requirements
Self Hosted Quick Start - Installing to Cloud Platforms
Self Hosted - Installation Using an OVA
Registration, Package Installation, and Initialization
First Steps After Initialization of the Console
Deployment Options
Main and Subordinate Consoles
Agent-Based Deployment
User Managed Scan Deployment
Credentialed Scanning Deployment
Mixed Environment
Deployment Tools
Active Directory Group Policy
Microsoft Endpoint Configuration Manager (part of InTune)
Tanium Deploy
HCL BigFix
Ivanti
Virtual Machines
VMWare
Virtual Box
VirtualBox Guest Additions
AWS EC2 (BYOL)
AWS EC2 (Usage Based)
Azure Cloud
Google Cloud
Additional Items to Consider
Main Console Server Certificates
LDAP
TOFU
Clock Sync
DeepSurface Commands
Multiple Vulnerability Sources
API Documentation
User Guide
Reporting
Dashboards
Exports
Risk Insight
Hosts
Patches
Vulnerabilities
Vulnerability Instances
Users
Remediation Workflow Manager
Plans
Settings
Integrations
Workflow
Exporting
Accepted Risk Plans
Accepted Risk Workflow
Explore
Model
Paths
Activity
Tasks
Configuration Alerts
Scan Logs
Notification Settings
Scanning
Status
Agents
User Managed
Credentialed Scanning Settings
Credentials
Scan Groups
General Settings
Cloud Scanning
Network Connectivity
Subordinates
Vulnerability Sources
Setup
Sensitive Assets: Polices
Sensitive Assets: Manual
Admin Settings
SMTP Settings
Certificates
Outbound Proxy
Authentication Providers
Users
Tags
Integrations Guide
Vulnerability Sources
CrowdStrike Spotlight
SentinelOne
Carbon Black Cloud
Microsoft Defender for Endpoint
Wazuh
Lansweeper Cloud
Nessus API
Tenable.io API
Security Center/Tenable.sc API
Rapid7 InsightVM API
Qualys API
Nozomi Guardian
Eclypsium
AWS Inspector
Remediation
Jira Software
Tanium (BETA)
Authentication Providers
LDAP (Active Directory)
SAML (Azure Active Directory)
SAML (Google)
SAML (Okta)
PAM
CyberArk
Delinea (Thycotic)
Microsoft LAPS
Security Guide
Firewall Configuration
Base Network Requirements
Agent Network Requirements
Credentialed Scanning Network Requirements
API Network Requirements
How DeepSurface Scans Work
Domain (LDAP) Scanning
Host Scanning Routine
Reasons for the Administrative Access Requirement
Endpoint Protection Considerations
Other Items
Scope of Data Storage and Retention
IPS/IDS Considerations
Logging
Resetting the DSADMIN password
Product Information
Changelogs
Open source Licenses
End User License Agreement (EULA)

instances 1

The vulnerability instances report differs from the other reports in the risk insight section in a few different ways. The first major visual difference is the visual at the top of the page. Unlike the other reports, the vulnerability instances report does not feature a bar chart of elements that represent risk. Instead, the vulnerability instances report has a that breaks down vulnerability instances by category. Before doing any risk rating analysis on vulnerabilities, DeepSurface first applies rules that help determine the best category to put the vulnerability instance into. One way to think about the vulnerability instances report is by comparing it to a funnel. DeepSurface begins by taking all of the instances reported by your vulnerability scanner(s) and subsequently sorts and categorizes them until arriving at a much narrower set of instances that you should begin your remediation efforts with. After taking context, internal rules, and publicly available information into account, DeepSurface ultimately determines what subset of vulnerability instances in your environment actually pose a risk.

If at any point you would like more information about a particular category, or any of the instances that were included within it, simply hover over a given category (or select the category from the category dropdown to filter down to just that category) and read the helpful explanation of the reasoning behind that category.

Filtering

Host, patch, vulnerability, and vulnerability instance reprots all have robust filtering options. To learn more about filtering see the Filtering Section of the help documentation.

Exporting

Any report can be exported as an Excel spreadsheet or PDF. For more information on exporting, see the Exporting Section of the help documentation.

Advanced Filtering and Grouping

The vulnerability instances report provides a few additional filtering options that are not present in any of the other risk insight reports. It is possible to group the vulnerability instances 4 different ways. To change the grouping, locate the group selector above the table of results and switch between host, patch, vulnerability, or scanner signature.

instances 1

Viewing a table of vulnerability instances grouped by scanner signature is unique to this report:

instances 1

There is also a shortcut filter button on every row of the results table, regardless of what grouping method. If you ever want to just see the vulnerability instances that apply to a given host/patch/vulnerability/signature, click the filter button at the end of the row and the results will automatically filter down to that single record. This is effectively the same as applying the specific host/patch/vulnerability/signature filter in the filter builder, but just a handy shortcut. To remove the filter, toggle the same filter button in the remaining row.

instances 1

instances 1