Add a Vulnerability to a POAM

Local guidelines may differ; however, you will typically Add to POAM when: A vulnerability is past due A vulnerability will not be fixed within a reasonable time frame A vulnerability is a false positive SA requests Risk Acceptance Management needs additional information on a high visibility vulnerability Ryskview does not allow the same POAM vulnerability […]

Scan Data

Scan Data shows all vulnerabilities that are directly from scans and have not been added to a POAM.   Filter data by their Asset Type. Examples include desktops, laptops, IoT, switches, etc. Once you submit a POAM, the vulnerability will move from Scan Data to the Task Queue. Note: After data is imported, Ryskview will add […]