You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-clone-reports.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,8 @@
10
10
You can make copies of vulnerability report configurations by cloning them. This is useful when you want to reuse report configurations with minor changes, such as reporting vulnerabilities in different deployments or namespaces.
11
11
12
12
.Procedure
13
-
. In the {product-title-short}web portal, click *Vulnerability Management*->*Vulnerability Reporting*.
13
+
. In the {product-title-short} portal, click the *Vulnerability Management*->*Vulnerability Reporting*->*Report configurations* tab.
14
14
. Locate the report configuration that you want to clone in the list of report configurations.
15
-
. Click *Clone report*.
15
+
. Click the overflow menu, {kebab}, and then click *Clone report*.
16
16
. Make any changes that you want to the report parameters and delivery destinations.
17
-
. Click *Create*.
17
+
. Review the report parameters, and then click *Save*.
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-creating-report.adoc
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,19 +10,19 @@
10
10
{product-title-short} guides you through the process of creating a vulnerability management report configuration. This configuration determines the information that will be included in a report job that runs at a scheduled time or that you run on demand.
11
11
12
12
.Procedure
13
-
. In the {product-title-short} portal, click *Vulnerability Management*->*Vulnerability Reporting*.
13
+
. In the {product-title-short} portal, click the *Vulnerability Management*->*Vulnerability Reporting*->*Report configurations* tab.
14
14
. Click *Create report*.
15
15
. In the *Configure report parameters* page, provide the following information:
16
16
***Report name*: Enter a name for your report configuration.
17
17
***Report description*: Enter a text describing the report configuration. This is optional.
18
18
***CVE severity*: Select the severity of common vulnerabilities and exposures (CVEs) that you want to include in the report configuration.
19
-
***CVE status*: Select one or more CVE statuses.
19
+
***CVE status*: Select one or more CVE statuses.
20
20
+
21
21
The following values are associated with the CVE status:
22
22
+
23
23
*** *Fixable*
24
24
****Unfixable*
25
-
***Image type*: Select one or more image types.
25
+
***Image type*: Select one or more image types.
26
26
+
27
27
The following values are associated with image types:
28
28
+
@@ -40,9 +40,9 @@ You can select one or more columns to include in the report configuration.
40
40
*** Select the *Include EPSS probability* checkbox, if you want to include the EPSS probability column in the report configuration.
41
41
*** Select the *Include advisory name and link* checkbox, if you want to include the advisory name and link column in the report configuration.
42
42
** *Configure collection included*: To configure at least one collection, do any of the following tasks:
43
-
*** Select an existing collection that you want to include.
43
+
*** Select an existing collection that you want to include.
44
44
+
45
-
To view the collection information, edit the collection, and get a preview of collection results, click *View*.
45
+
To view the collection information, edit the collection, and get a preview of collection results, click *View*.
46
46
+
47
47
When viewing the collection, entering text in the field searches for collections matching that text string.
48
48
*** To create a new collection, click *Create collection*.
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-download-reports.adoc
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,14 +15,14 @@ You can only download reports that you have generated; you cannot download repor
15
15
====
16
16
17
17
.Procedure
18
-
. In the {product-title-short}web portal, click *Vulnerability Management*->*Vulnerability Reporting*.
18
+
. In the {product-title-short} portal, click the *Vulnerability Management*->*Vulnerability Reporting*->*Report configurations* tab.
19
19
. In the list of report configurations, locate the report configuration that you want to use to create the downloadable report.
20
-
. Generate the vulnerability report by using one of the following methods:
21
-
* To generate the report from the list:
22
-
.. Click the overflow menu, {kebab}, and then select *Generate download*. The *My active job status* column displays the status of your report creation. After the *Processing* status goes away, you can download the report.
23
-
* To generate the report from the report window:
24
-
.. Click the report configuration name to open the configuration detail window.
25
-
.. Click *Actions* and select *Generate download*.
26
-
. To download the report, if you are viewing the list of report configurations, click the report configuration name to open it.
27
-
. Click *All report jobs* from the menu on the header.
28
-
. If the report is completed, click the *Ready for download* link in the *Status* column. The report is in `.csv` format and is compressed into a `.zip` file for download.
20
+
. Choose the appropriate method to generate the vulnerability report:
21
+
* To generate the report from the *Report configurations* tab, complete the following steps:
22
+
.. Click the overflow menu, {kebab}, and then select *Generate download*.
23
+
.. After the report is generated, click the *Ready for download* link in the *My last job status* column. The report is in `.csv` format and is compressed into a `.zip` file for download.
24
+
* To generate the report from the *Configuration details* tab, complete the following steps:
25
+
.. To open the *Configuration details* tab, click the report configuration name.
26
+
.. Click *Actions*, and then select *Generate download*.
27
+
.. Click the *All report jobs* tab from the menu on the header.
28
+
.. After the report is generated, click the *Ready for download* link in the *Status* column. The report is in `.csv` format and is compressed into a `.zip` file for download.
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-edit-reports.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,8 @@
10
10
You can edit existing vulnerability report configurations from the list of report configurations, or by selecting an individual report configuration first.
11
11
12
12
.Procedure
13
-
. In the {product-title-short}web portal, click *Vulnerability Management*->*Vulnerability Reporting*.
13
+
. In the {product-title-short} portal, click the *Vulnerability Management*->*Vulnerability Reporting*->*Report configurations* tab.
14
14
. To edit an existing vulnerability report configuration, complete any of the following actions:
15
15
* Locate the report configuration that you want to edit in the list of report configurations. Click the overflow menu, {kebab}, and then select *Edit report*.
16
16
* Click the report configuration name in the list of report configurations. Then, click *Actions* and select *Edit report*.
17
-
. Make changes to the report configuration and save.
17
+
. Make changes to the report configuration, and then click *Save*.
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-report-review-create.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,5 +10,5 @@
10
10
You can review the details of your vulnerability report configuration before creating it.
11
11
12
12
.Procedure
13
-
. In the *Review and create* section, you can review the report configuration parameters, delivery destination, email template that is used if you selected email delivery, delivery schedule, and report format. To make any changes, click *Back* to go to the previous section and edit the fields that you want to change.
14
-
. Click *Create* to create the report configuration and save it.
13
+
. In the *Review* section, you can review the report configuration parameters, delivery destination, email template that is used if you selected email delivery, delivery schedule, and report format. To make any changes, click *Back* to go to the previous section and edit the fields that you want to change.
14
+
. To create the report configuration and save it, click *Save*.
Copy file name to clipboardExpand all lines: modules/vulnerability-management20-retention-settings.adoc
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,11 +22,10 @@ These settings do not affect the following vulnerability report jobs:
22
22
23
23
.Procedure
24
24
. In the {product-title-short} web portal, go to *Platform Configuration*->*System Configuration*. You can configure the following settings for vulnerability report jobs:
25
-
* *Vulnerability report run history retention*: The number of days that a record is kept of vulnerability report jobs that have been run. This setting controls how many days that report jobs are listed in the *All report jobs* tab under *Vulnerability Management*->*Vulnerability Reporting* when a report configuration is selected. The entire report history after the exclusion date is deleted, with the exception of the following jobs:
25
+
* *Vulnerability report run history retention*: The number of days that a record is kept of vulnerability report jobs that have been run. This setting controls how many days that report jobs are listed in the *Report configurations* tab under *Vulnerability Management*->*Vulnerability Reporting* when a report configuration is selected. The entire report history after the exclusion date is deleted, with the exception of the following jobs:
26
26
** Unfinished jobs.
27
27
** Jobs for which prepared downloadable reports still exist in the system.
28
28
** The last successful report job for each job type (scheduled email, on-demand email, or download). This ensures users have information about the last run job for each type.
29
-
* *Prepared downloadable vulnerability reports retention days*: The number of days that prepared, on-demand downloadable vulnerability report jobs are available for download on the *All report jobs* tab under *Vulnerability Management*->*Vulnerability Reporting* when a report configuration is selected.
29
+
* *Prepared downloadable vulnerability reports retention days*: The number of days that prepared, on-demand downloadable vulnerability report jobs are available for download on the *Report configurations* tab under *Vulnerability Management*->*Vulnerability Reporting* when a report configuration is selected.
30
30
* *Prepared downloadable vulnerability reports limit*: The limit, in MB, of space allocated to prepared downloadable vulnerability report jobs. After the limit is reached, the oldest report job in the download queue is removed.
31
31
. To change these values, click *Edit*, make your changes, and then click *Save*.
0 commit comments