Skip to main content

Recommendation by application

Use the Recommendation by application dashboard in Risk Monitor to get upgrade recommendations for the applications in your IT estate.

Description

The table Recommended upgrade by application contains all upgradable applications in your IT estate. For each application, the table gives a recommendation on the version to which the application should be upgraded to remove as many vulnerabilities as possible. It also shows the number of vulnerabilities that will be removed if the application is upgraded to the recommended version.

When you select a row in Recommended upgrade by application, the table Vulnerabilities removed by upgrade will list all vulnerabilities that will be removed from your IT estate if the application in the selected row is upgraded to the recommended version.

You can filter the data to focus on a specific subset of the applications in your organization. All key figures and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:

  • The recommended upgrade for a specific application.

  • Recommended upgrades for all applications within a specific department in the organization.

  • Recommended upgrades for the applications on a specific device.

  • Recommended upgrades for all vulnerabilities within a certain base score range.

Characteristics

You can refer to the tables below for descriptions of the key figures, filters, and tables on the dashboard.

Key figures

The key figures give a quick overview of the upgradable applications in your IT estate.

Key figureDescription
Upgradable applicationsThe number of applications in your IT estate that can be upgraded to a later version.
Removable vulnerabilitiesThe number of vulnerabilities that can be removed by upgrading applications to a later version.
DevicesThe number of devices with upgradable applications.

Filters

Use one or more filters to focus on specific aspects of the applications in your IT estate. The key figures and tables on the dashboard will adjust to show the results filtered by the selected parameter or parameters.

FilterDescription
Application nameSelect an application from the list to see the recommended upgrade for the application.
OrganizationSelect an organizational unit from the list to see recommended upgrades for all applications used by devices belonging to that organizational unit.
Base severitySelect a base severity to see recommended upgrades for applications with vulnerabilities of the selected base severity.
Device nameSelect a device name from the list to see recommended upgrades for the applications on that device.
BaseScoreSelect a range to see the recommended upgrades for applications with vulnerabilities having base scores within that range.

Tables

Use the tables to see upgrade recommendations for applications in your IT estate.

Select a column header to sort the table by that column.

TableDescription
Recommended upgrade by applicationWhen no filters are applied to the dashboard, the table includes all upgradable applications in your IT estate.
The following details are shown in the table:
  • Application name: The name of the upgradable application.
  • Software version: The version of the upgradable application.
  • Recommended application name: The name of the recommended application. IF you upgrade to the recommended application and version, as many vulnerabilities as possible will be removed.
  • Recommended application version: The version of the recommended application.
  • Vulnerabilities removed: The total number of vulnerabilities that will be removed from your IT estate if the application is upgraded to the recommended application version on all affected devices.
  • Inventoried devices: The number of devices containing the upgradable application.
  • Unique vulnerabilities: The number of unique vulnerabilities that will be removed from your IT estate if the application is upgraded to the recommended application version on all affected devices.
Vulnerabilities removed by upgradeThe table lists all vulnerabilities that will be removed if the applications listed in the Recommended upgrade by application table are upgraded to the recommended version.
The following details are shown in the table:
  • CVEID: The CVE identifier number for the vulnerability.
  • BaseScore: The CVSS base score for the vulnerability.
  • BaseSeverity: The base severity for the vulnerability.