Recommendation by device
Use the Recommendation by device dashboard in Risk Monitor to get upgrade recommendations for the devices in your IT estate.
Description
The table Recommended upgrade by device contains all devices with upgradable applications in your IT estate. For each application, the table gives a recommendation on the version to which the application should be upgraded to remove as many vulnerabilities as possible. It also shows the number of vulnerabilities that will be removed if the application is upgraded to the recommended version. If you sort the table by the Vulnerabilities removed column, you will see what application upgrade will remove the largest number of vulnerabilities from a particular device.
When you select a row in Recommended upgrade by device, the table Vulnerabilities removed by upgrade will list all vulnerabilities that will be removed from the device in the selected row if the application is upgraded to the recommended version.
You can filter the data to focus on a specific subset of the devices in your organization. All key figures and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:
-
All devices with a specific application installed and the recommended upgrade for that application.
-
Recommended upgrades for all devices within a specific department in the organization.
-
Recommended upgrades for the applications on a specific device.
Characteristics
You can refer to the tables below for descriptions of the key figures, filters, and tables on the dashboard.
Key figures
The key figures give a quick overview of the upgradable applications in your IT estate.
Key figure | Description |
---|---|
Upgradable applications | The number of applications in your IT estate that can be upgraded to a later version. |
Removable vulnerabilities | The number of vulnerabilities that can be removed by upgrading applications to a later version. |
Filters
Use one or more filters to focus on specific aspects of the devices in your IT estate. The key figures and tables on the dashboard will adjust to show the results filtered by the selected parameter or parameters.
Filter | Description |
---|---|
Application name | Select an application from the list to focus on all devices with the application installed. |
Organization | Select an organizational unit from the list to see recommended upgrades for all devices belonging to that organizational unit. |
Base severity | Select a base severity to focus on upgrade recommendations that will remove vulnerabilities with the selected base severity. |
Device name | Select a device name from the list to see recommended upgrades for the applications on that device. |
BaseScore | Select a range to focus on upgrade recommendations that will remove vulnerabilities with base scores within that range. |
Tables
Use the tables to see upgrade recommendations for devices in your IT estate.
Select a column header to sort the table by that column.
Table | Description |
---|---|
Recommended upgrade by device | When no filters are applied to the dashboard, the table includes all devices with upgradable applications in your IT estate. The following details are shown in the table:
|
Vulnerabilities removed by upgrade | The table lists all vulnerabilities that will be removed if you upgrade the applications listed in the Recommended upgrade by device table to the recommended version. The following details are shown in the table:
|