Skip to main content

IT management

The Risk Monitor use cases in this section focus on application lifecycles and application support.

  1. Go to the Application lifecycle dashboard and make sure the End of support view is selected.

  2. Perform one of the following actions:

    • Set the end date in the upper-right corner of the Application details table to today's date.

      The table will filter to show all applications having reached end of support up until today.

    • Select a bar in the End of support timeline chart to focus on the applications that went out of support a certain year. You can for example select the bar on the far left to focus on the applications that have been out of support the longest.

      The Application details table will filter to show a list of all applications that went out of support that year.

    For each application, the table will show available upgrade paths, if any.

  1. Go to the Application lifecycle dashboard and make sure the End of support view is selected.

  2. Study the Applications with End of support within 12 months table. It lists all applications that will go out of support during the coming 12 months. To find out more about a specific application in the table, you can for example:

    • Select the application. The Application details table will filter to show details about the selected application, such as available upgrade paths.

    • Right-click the application and select Drill through > List vuln. by device(s) and application(s).

      You will see a list of all devices with the application installed.

  1. On the Applications dashboard, set the Open source filter to True.

    The page is filtered to show only open source applications. If there are no open-source applications in your IT estate, the page will show blank results.

  2. Study the key figures, charts, and tables to find out more about the open-source applications. You can, for example, look at:

    • The key figures to see how many open source applications there are in your IT estate, and how many of them are vulnerable or may contain personally identifiable information, or both.

    • The Application details table to see all open source applications grouped by manufacturer.

      You can, for example, sort the table by the Critical vulnerabilities column to find the open-source applications with the highest number of critical vulnerabilities.

  1. On the Vulnerability explorer dashboard, set the Application name filter to the name of the application.

  2. In the Vulnerable devices, applications and users table, expand the table by selecting the plus icon in the Application manufacturer column and then selecting the plus icon in the Application name column.

    The Software version column shows all versions of the application that are present in your IT estate.

  1. On the top menu bar, select Risk > Vulnerability lookup.

    The Vulnerability lookup dashboard is displayed.

  2. Select the application manufacturer from the Manufacturer filter list.

  3. Select the application name from the Application hierarchy filter list.

  4. Select the software version from the Software version filter list.

    The Vulnerability details list is filtered to show all known vulnerabilities for the application version, if any.

If there are sales terminals or workshop machines that a lot of people are using, it might be useful to see the users of that specific device.

  1. Go to the Users dashboard.

  2. Expand the Filters pane on the right side of the page and set the Device name filter to the name of the device.

    The User details table is filtered to show a list of all users having accessed the device.

You can export the data in the table to a .csv or .xlsx file by selecting the More options menu in the upper-right corner of the table and then select Export data.

This could be useful, for example, if an application is discovered to contain a critical vulnerability and therefore should no longer be used by anyone in the organization.

  1. Go to the Users dashboard.

  2. Set the Application name filter to the name of the application.

    The User details table is filtered to show a list of all users having used the application.

You can export the data in the table to a .csv or .xlsx file by selecting the More options menu in the upper-right corner of the table and then select Export data.

  1. Go to the Users dashboard.

  2. Set the User name filter to the name of the user.

    The User details table shows a single row with details of the user.

  3. Right-click the table row and select Drill through > List vuln. By device(s) and application(s).

    You will see a list of all devices, applications, and vulnerabilities connected to the user.