Last Updated: 2025-05-16
Purpose
This article provides a comprehensive overview of the Solutions View, describing its functionalities, visualization types, and data interlinks within visible views.
Introduction
The Solutions View is a crucial component in managing cybersecurity vulnerabilities. It provides a holistic overview of the views functionalities, visualizations, and data interconnections within visible views. From access and layout, to interactive features and top 10 solutions, this document aims to empower users with practical insights. It ensures that users can efficiently leverage the Solutions View for effective cybersecurity management.
Solutions View
To access the Solutions View, navigate to Insights > Solutions in the Main Menu.
Layout
The Solutions view is divided into three main parts. Solutions bar, bar chart and vulnerabilities table.
Solutions bar
This top section shows:
-
Total number of solutions available for the data on screen
-
Watched - count of watched vulnerabilities
-
Fixed - count of fixed vulnerabilities
-
Accepted - count of accepted vulnerabilities
-
False Positives - count of vulnerabilities marked as false positives
On the right side, you will see:
-
Vulnerabilities count - Shows how many vulnerabilities are currently visible in the table, including any increase or decrease.
-
Assets affected - Shows how many assets are impacted. Only added assets are counted, removed ones are not.
The tiles for Watched, Fixed, Accepted, and False Positives are clickable. Clicking a tile filters the vulnerabilities table and updates all related metrics on screen.
Solutions bar chart
Below the bar, a chart shows all solutions grouped by type, ordered by count and representing first level of drill-down.
Click a bar solution type bar to see the specific solutions. Click a solution to filter by it. Any interaction in this chart filters all visible data in the vulnerabilities table and metrics. Likewise, filters applied in the vulnerabilities table also affect the displayed metrics and stats.
Assets Panel and Findings Table
For a detailed understanding of how the Findings view operates, refer to the Vulnerabilities section for an overview.
Reference
Related Articles
- Notifications
- Delta
- Solutions
- Accepting a Risk
- Getting Started with the Portal
- Licensing Consumption
- Column Configuration
- Filters
- Common Settings Panel
- Discussions and Commenting
- Managing Tags
- Tags
- View Templates
- Scan Configuration Settings
- Scan Credentials
- Account
- Schedules
- Scans View
- Scan Policies
- Scan Assessment Configuration
- Discovery Scan Configuration
- Vulnerabilities
- Report Library
- Reports
- Identity and Access Management (IAM)
- Basic Credentials
- Assets
- Asset Discovery
- HIAB Console
- HIAB Deployment Guide
- Technical Specification
- HIAB Distribution Settings
- Scan Stages
- Scanning Range
- Using the Agent Info Command
- Checking if Agent is Running
- Removing an Agent from Windows
- Setting Up an Agent Using System Proxy
- Agent Latest Version
- Agent Call Home
- Agent Introduction
- Firewall Rules
- Understanding Scanner and Scheduler
- Supported Browsers
- Check Connectivity to Agent Server
- API Examples
- Retrieving a REST API Token From XMLAPI
- REST API Interface Technical Document
- XML API Interface Technical Document
- Object Identifiers
- DNS Lookup in UI and in Console
- Scan Blueprint
- Scan Scheduling Errors
- Troubleshooting checklists
- Importing Tags for AWS Discovery
- Removing an Agent from Linux
- Workflows
- HIAB E-mail Whitelisting
- Event Notification - Use Cases
- Subscriptions Overview
- Notification Settings
- Scheduled Reports
- Marking as False Positives
- Vulnerability Database
- Installing a macOS Agent
- Generate Reports
- Event Notification - Integration
- Portal Icon List
- Log In Using LDAP
- Log In Using Single Sign-On (SSO)
- Logging in to the Portal
- PGP on User Accounts
- 2FA on User Accounts
- Resource Group Management
- Role Management
- User Management
- Products
- Certificates
- Ports
- Services
- Products Database
- Download Agents
- Agent Installation Introduction
- Installing a Linux Agent
- Installing a Windows Agent
- Managing Agents