DeepSurface: Vulnerabilities
DocumentationInstallation GuideOverviewLet DeepSurface Host For YouGetting StartedSystem RequirementsSelf Hosted Quick Start - Installing to Cloud PlatformsSelf Hosted - Installation Using an OVARegistration, Package Installation, and InitializationFirst Steps After Initialization of the ConsoleDeployment OptionsMain and Subordinate ConsolesAgent-Based DeploymentUser Managed Scan DeploymentCredentialed Scanning DeploymentMixed EnvironmentDeployment ToolsActive Directory Group PolicyMicrosoft Endpoint Configuration Manager (part of InTune)Tanium DeployHCL BigFixIvantiVirtual MachinesVMWareVirtual BoxVirtualBox Guest AdditionsAWS EC2 (BYOL)AWS EC2 (Usage Based)Azure CloudGoogle CloudAdditional Items to ConsiderMain Console Server CertificatesLDAPTOFUClock SyncDeepSurface CommandsMultiple Vulnerability SourcesAPI DocumentationUser GuideReportingDashboardsExportsRisk InsightHostsPatchesVulnerabilitiesVulnerability InstancesUsersRemediation Workflow ManagerPlansSettingsIntegrationsWorkflowExportingAccepted Risk PlansAccepted Risk WorkflowExploreModelPathsActivityTasksConfiguration AlertsScan LogsNotification SettingsScanningStatusAgentsUser ManagedCredentialed Scanning SettingsCredentialsScan GroupsGeneral SettingsCloud ScanningNetwork ConnectivitySubordinatesVulnerability SourcesSetupSensitive Assets: PolicesSensitive Assets: ManualAdmin SettingsSMTP SettingsCertificatesOutbound ProxyAuthentication ProvidersUsersTagsIntegrations GuideVulnerability SourcesCrowdStrike SpotlightSentinelOneCarbon Black CloudMicrosoft Defender for EndpointWazuhLansweeper CloudNessus APITenable.io APISecurity Center/Tenable.sc APIRapid7 InsightVM APIQualys APINozomi GuardianEclypsiumAWS InspectorRemediationJira SoftwareTanium (BETA)Authentication ProvidersLDAP (Active Directory)SAML (Azure Active Directory)SAML (Google)SAML (Okta)PAMCyberArkDelinea (Thycotic)Microsoft LAPSSecurity GuideFirewall ConfigurationBase Network RequirementsAgent Network RequirementsCredentialed Scanning Network RequirementsAPI Network RequirementsHow DeepSurface Scans WorkDomain (LDAP) ScanningHost Scanning RoutineReasons for the Administrative Access RequirementEndpoint Protection ConsiderationsOther ItemsScope of Data Storage and RetentionIPS/IDS ConsiderationsLoggingResetting the DSADMIN passwordProduct InformationChangelogsOpen source LicensesEnd User License Agreement (EULA)

The vulnerability analysis report answers the question, what vulnerabilities pose the greatest risk to my environment? By default, the main page of the vulnerability analysis report shows the top 100 vulnerabilities that carry the most risk in your environment. This can be filtered down to your liking (as described in the previous section) and clicking on any of the vulnerability items in the report will bring you to the detail page for that vulnerability.

Filtering
Host, patch, vulnerability, and vulnerability instance reprots all have robust filtering options. To learn more about filtering see the Filtering Section of the help documentation.
Exporting
Any report can be exported as an Excel spreadsheet or PDF. For more information on exporting, see the Exporting Section of the help documentation.
Detail View
Detail pages in general are discussed in the common elements section, but a vulnerability detail page has some unique sections and elements that are discussed below:
1. The Summary Panel: the summary panel gives you a broad and high-level overview of what DeepSurface knows about a particular vulnerability. Starting at the top, the summary panel tells you:
- A breakdown of all the categories of vulnerability instances
- A brief description of the vulnerability
- Any additional DeepSurface notes about this vulnerability
- A detailed description of the CVSS vector string and all of its components
- Links to any external resources relevant to this vulnerability
- High-level counts of affected hosts and patches available
- An exploit status rating based on whether or not this vulnerability is being exploited in the wild

2. Affected hosts and missing patches: A list of all hosts that are affected by this vulnerability, as well as a list of all the missing patches that could address this vulnerability can also be found on the "Risk and Remediation" tab. If there are more than 200 present of any of these categories, you can follow the link to take to the corresponding report, filtered by this vulnerability. Often patches also supersede or "roll up" older patches. To see if this is the case for any of the patches listed, click the rollup icon for a given patch and a modal will show a list of all rolled up patches.