|
3 | 3 | // * operating/manage-vulnerabilities/vulnerability-management.adoc |
4 | 4 | :_mod-docs-content-type: PROCEDURE |
5 | 5 | [id="vulnerability-management20-view-workload-cve_{context}"] |
6 | | -= Viewing workload CVEs in Vulnerability Management (2.0) |
| 6 | += Viewing workload CVEs |
7 | 7 |
|
8 | 8 | [role="_abstract"] |
9 | | -You can view a comprehensive list of vulnerabilities, or CVEs, in {product-title-short} across images and deployments. You can use the search filter bar to select specific CVEs, images, deployments, namespaces, or clusters. |
| 9 | + |
| 10 | +You can view vulnerabilities across images and deployments found by {product-title} in the *Vulnerability Management* -> *Workload CVEs* page. |
| 11 | + |
| 12 | +From the *View image vulnerabilities* menu, you can select from the following choices: |
| 13 | + |
| 14 | +* Image vulnerabilities: Displays images and deployments in which {product-title-short} has discovered CVEs. |
| 15 | +* Images without CVEs: Displays images that meet the following conditions: |
| 16 | +** Images that do not have CVEs |
| 17 | +** Images that report a scanner error that may result in a false negative of no CVEs |
| 18 | +** Images that have all known CVEs marked as *Deferred* or *False positive* |
| 19 | ++ |
| 20 | +[NOTE] |
| 21 | +==== |
| 22 | +An image that actually contains vulnerabilities can appear in this list by mistake. For example, if the {product-title-short} scanner was able to scan the image and it is known to {product-title-short}, but the scan did not successfully complete, vulnerabilities would not be detected. This scenario can occur if an image has an operating system that is not supported by the {product-title-short} scanner. Scan errors are displayed when you hover over an image in the image list or click the image name for more information. |
| 23 | +==== |
10 | 24 |
|
11 | 25 | .Procedure |
12 | | -. In the {product-title-short} portal, go to *Vulnerability Management (2.0)* -> *Workload CVEs*. |
13 | | -. From the drop-down list, select the search criteria you want to use. You can select an item type, such as a cluster, from the list, and then select the specific name of the item. You can add additional items to the filter by selecting another item from the list and selecting the specific name of the new item. For example, you can select a specific image and a specific cluster to limit results to those selections. You can filter on the following items: |
14 | | -* CVE |
15 | | -* Image |
16 | | -* Deployment |
17 | | -* Namespace |
18 | | -* Cluster |
19 | | -* Component |
20 | | -* Component source |
21 | | -. Optional: Use the *CVE severity* list to select the severities of the CVEs that you want to display. |
22 | | -. Click the relevant button to view a list of vulnerabilities, images, or deployments in the system. |
| 26 | + |
| 27 | +. To show all CVEs across all images, click *View image vulnerabilities* -> *Image vulnerabilities*. |
| 28 | +. You can filter CVEs by entity by selecting the appropriate filters and attributes. You can choose multiple entities and attributes by clicking the right arrow to add another criteria. Depending on your choices, enter the appropriate information such as text, or select a date or object. The filter entities and attributes are listed in the following table. |
23 | 29 | + |
| 30 | +.CVE filtering |
| 31 | + |
| 32 | +|=== |
| 33 | +|Entity|Attributes |
| 34 | + |
| 35 | +|Image |
| 36 | +a| |
| 37 | + |
| 38 | +* Name |
| 39 | +* Operating system |
| 40 | +* Tag |
| 41 | +* CVSS |
| 42 | +* Label |
| 43 | +* Created Time |
| 44 | +* Scan Time |
| 45 | +|Registry| |
| 46 | +|Deployment| |
| 47 | +|Namespace| |
| 48 | +|Cluster| |
| 49 | +|Node |
| 50 | +a| |
| 51 | +
|
| 52 | +* CVSS |
| 53 | +** is greater than |
| 54 | +** is greater than |
| 55 | +** is greater than or equal to |
| 56 | +** is equal to |
| 57 | +** is less than or equal to |
| 58 | +** is less than |
| 59 | +
|
| 60 | +a|Image CVE| |
| 61 | + |
| 62 | +* ID |
| 63 | +* Discovered Time |
| 64 | +** calendar input |
| 65 | +* CVSS |
| 66 | +** is greater than |
| 67 | +** is greater than |
| 68 | +** is greater than or equal to |
| 69 | +** is equal to |
| 70 | +** is less than or equal to |
| 71 | +** is less than |
| 72 | +* Type |
| 73 | +
|
| 74 | +|Node CVE |
| 75 | +a| |
| 76 | + |
| 77 | +* ID |
| 78 | +* Discovered Time |
| 79 | +* CVSS |
| 80 | +* Snoozed |
| 81 | +
|
| 82 | +|Platform CVE| |
| 83 | +|Image Component |
| 84 | +a| |
| 85 | + |
| 86 | +* Name |
| 87 | +* Source |
| 88 | +** OS |
| 89 | +** Python |
| 90 | +** Java |
| 91 | +** Ruby |
| 92 | +** Node.js |
| 93 | +** Dotnet Core Runtime |
| 94 | +** Infrastructure |
| 95 | +
|
| 96 | +* Version |
| 97 | +|Node Component|Name: Select from the list, or begin entering text to use autocomplete |
| 98 | +|=== |
| 99 | +
|
| 100 | +. To filter by severity, click *CVE severity* and select one or more levels. |
| 101 | +. To filter by CVE status, click *CVE status* and select *Fixable* or *Not fixable*. |
| 102 | +. To ???????, click *Prioritize by namespace view*. |
| 103 | + |
24 | 104 | [NOTE] |
25 | 105 | ==== |
26 | 106 | The *Filtered view* icon indicates that the displayed results were filtered based on the criteria that you selected. You can click *Clear filters* to remove all filters, or remove individual filters by clicking on them. |
27 | 107 | ==== |
| 108 | + |
28 | 109 | . In the list of results, click a CVE, image name, or deployment name to view more information about the item. For example, depending on the item type, you can view the following information: |
29 | 110 | + |
30 | 111 | * Whether a CVE is fixable |
|
0 commit comments