View Solutions
Access the Solutions from the Assets category.
- Security < Continuous Threat Exposure Management < 'Solutions'

Solutions Default Filters
The table data is filtered by default using the operating system where most data is found, but you can toggle between them using the drop-down.

Also, you can filter by EPSS Categorization by tapping the blue View button in the info panel.

| Note: We recommend using the EPSS to prioritize your vulnerabilities and decide which ones you will remediate first. Additionally, you can use the traditional severity categories of critical, high, medium, and low derived from the CVSS score. |
Sorting the table columns is a great way to bring the ‘biggest offenders’ to the top of the tables. Just click on the column header label to sort ascending and descending.

Remediation Plan
It displays all discovered vulnerabilities and problems, giving an overview of their scoring, severity, companies, affected assets, and, more importantly, the recommended KB/Fix or solution to fix the identified problem.
All column categories are configurable—feel free to select, deselect, or reorganize them to match your workflow.
All column categories are configurable—feel free to select, deselect, or reorganize them to match your workflow.

Remediation Plan Action Types
- OS Update = operating system patch needed; missing KB
- Software Patch = application patch needed; not running the latest version
- Uninstall = product is EOL or no longer supported; recommend to uninstall
- Run Remediation Script = script provided to remediate affected asset

Tap on the KB/Fix column to see the remediation details.

You can select Affected Assets using the global solutions view.

Suppress
You can choose to suppress any problems identified in the remediation plan. Suppression always requires approval to be completed. Once suppressed, we will move them to the Suppressed Records section.

You can also bulk suppress the selected records under remediation plan.

Suppression permissions are limited to only users with Admin and/or Approver role(s) selected.

If you'd like a non-admin user to suppress a vulnerability and assign it to an internal user, make sure they have both the AssetWriter and VulnerabilityWriter roles selected.

Integration Action
Note: If you have not configured an integration, the Integration Action menu will not work; please configure an integration and then visit these options.
Select at least one of the Remediation Plan items using the checkbox with Global Actions or the three-dot Action menu.
- Three-dot Action Menu on Single Suppression

- Global Action on Multiple Record Suppression

Tap on the Integration Action menu option.
Complete the Integration Action required fields, which include the Integration Mapping/Credential, Action, and Select Integration Profile.
This will create an alert based on your specified criteria.
Patch Now - Patch Later
The "Is Patchable" column indicates whether an application can be patched and is a button that allows you trigger the Patch Now or Patch Later options.
This column will appear regardless of whether the Patch Management feature is currently enabled or disabled in your Company Settings > Patch Management.
You can also access Patch Now and Patch Later from the three-dot Action menu.
You can also access Patch Now and Patch Later from the three-dot Action menu.

Check out our Patch Management Guide here: Patch Management Guide
Remediated Records
This is your collection of all the remediated problems detected by the scan agent, along with the details linking to the affected assets, dates, tickets, and more.

Tap on the Affected Assets count to see the details within.

Tap in the top-right of the table to return to the table data view.

Resolved Remediation Reports only display data for the last 90 days. This limitation is intentional, as storing and generating report data beyond 90 days can lead to performance issues and potential report failures when there is a large data.
To review all Historical Remediation Data including items older than 90 days you can download the Remediated Records as a csv. in the Company > Solutions > Remediated

Pending Remediation Velocity
These are open, pending problems that require remediation or suppression still.
This provides insight into the length of time vulnerabilities remain active in the system and how quickly remediation is taking place.
We group these based on a range of days and severity.
- 0-7 Days
- 8-15 Days
- 16-30 Days
- > 30 Days
You can view the Pending Remediation Application data.

Note: Tap on any of the value-colored cells to see the asset data and additional details.
Severity filtering is also available.

Remediated Velocity
This is your view on the remediated records. From the global perspective, the data is categorized by application. The information is organized into time ranges that include 0 to 7 days, 8 to 15 days, 16 to 30 days, and more than 30 days.
Tap any number values in the date range boxes to see the details.

Suppressed Records
Tap here to view approved, suppressed records along with all the details.

Tap on the three-dot Action menu to use the ‘unsuppress’ action.


