Skip to main content

Vulnerability Scanner Dashboard Overview


Overview

The Dashboard consolidates insights from all scan engines and displays the current state of:
  • Total vulnerabilities detected
  • Severity-level distribution
  • Total scans performed
  • Active scanners
  • Asset coverage
It highlights both long-term trends and moment-to-moment changes in your vulnerability landscape.

Key Metrics & Analytics

Total Vulnerabilities

Displays the complete count of vulnerabilities detected across all assets.

Total Scans

Shows how many scans have been executed historically.

Active Scanners

Indicates how many scanner engines are connected and reporting.

Total Assets

Number of assets discovered in the scanner’s catalogue.

Coverage Trend

Tracks scan coverage improvements or declines over time.

Risk Visibility

Shows how much of your attack surface has been assessed.

Vulnerability Trend Graph

Vulnerability Trend (12 Months)

This graph helps you analyze:
  • Vulnerability spikes
  • Reduction after remediation efforts
  • Seasonal or deployment-related changes
  • Scanner efficiency over time
Use it to correlate security events with operational changes.

Top 10 Vulnerabilities

Top 10 Vulnerabilities

This table highlights:
  • Most common issues
  • Repeated misconfigurations
  • High-frequency weaknesses
  • Vulnerabilities concentrated on specific assets
Columns include:
  • Title
  • Asset
  • Scanner
  • Severity
  • Found On
This helps analysts quickly identify widespread or urgent issues.

Severity Snapshot

Critical

Count of critical severity vulnerabilities (currently may show 0 if none detected).

High

High severity issues requiring prompt remediation.

Medium

Moderate risks that may require patching or configuration fixes.

Low / Info

Low-risk findings such as missing headers or informational signals.

Asset Exposure & Coverage

The dashboard highlights:
  • Total discovered assets
  • Assets with vulnerabilities
  • Safe assets
  • Percentage coverage
This gives a clear picture of scanning completeness and gaps requiring attention.

How to Use the Dashboard

Monitor Risk Posture

Track changes in vulnerability count and criticality over time.

Prioritize Fixes

Use severity, frequency, and asset importance to prioritize remediation.

Validate Scanning Health

Ensure scanners are active and scan cycles are running as expected.

Detect Anomalies

Identify sudden spikes that may indicate new vulnerabilities or exposed assets.

Next Steps

View Vulnerability Catalogue

Explore full vulnerability details, states, and remediation workflows.