Help Center> Vulnerability Scan Service> FAQs> About Operations> How Do I View Vulnerability Fixing Suggestions?
Updated on 2022-02-24 GMT+08:00

How Do I View Vulnerability Fixing Suggestions?

To view suggestions on how to fix website vulnerabilities, perform the following steps:

  1. Log in to the management console.
  2. In the navigation pane, choose Asset List. On the displayed page shown in Figure 1, click the Website tab. Table 1 describes the related parameters.

    Figure 1 List of websites
    Table 1 Parameter description

    Parameter

    Description

    Domain Information

    • Domain name/IP address
    • Customizable name for a domain

    Authentication Status

    • Authenticated

      The target domain name has been authenticated.

    • Not authenticated

      The target domain name has not been authenticated. Click Authenticate.

    • Certificate expired

      If the certificate is invalid, download the certificate file again and complete domain authentication.

    Last Scan Time

    Time when the last scan job begins

    Last Scan Result

    Information about the last scan job, including the score and number of vulnerabilities at each level. Click the score or View details to view scan details.

  3. In the Last Scan Result column of the target website, click the score or View Details. The job details page is displayed.
  4. Click the Vulnerability List tab. The Vulnerability List tab page is displayed, as shown in Figure 2.

    Figure 2 Vulnerability List tab page

  5. Click a vulnerability name to view Vulnerability Details, Vulnerability Overview, and Recommended Action. See Figure 3.

    Figure 3 Vulnerability details

To view suggestions on how to fix host vulnerabilities, perform the following steps:

  1. Log in to the management console.
  2. In the navigation pane, choose Asset List. On the displayed page, click the Host tab. See Figure 4.

    Figure 4 Host tab page

  3. In the Last Scan Result column of the target server, click the score or View details. The job details page is displayed.

    Figure 5 Job details page

  4. Click the Vulnerability List tab. The Vulnerability List tab page is displayed, as shown in Figure 6.

    Figure 6 Vulnerability List tab page
    NOTE:

    To ignore a vulnerability, click Ignore in the Operation column of the target vulnerability.

  5. Click a vulnerability name. The vulnerability details page is displayed, as shown in Figure 7. You can rectify the vulnerability as recommended.

    Figure 7 Vulnerability details

About Operations FAQs

more