Exposure Overview Workspace

Exposure Overview offers a holistic approach to tracking, assessing, and mitigating risks across your entire IT ecosystem, ensuring comprehensive risk oversight. This workspace highlights the most critical risks across your most critical assets against metrics such as SLA and Time to Resolution. This approach helps teams identify risks faster, prioritize remediation efforts, and demonstrate clear progress in your security initiatives, to eventually reduce the likelihood of a security breach.

Products Required for this Workspace

To access and use this workspace, you must have access to Axonius Exposures.

Adapters Recommended for this Workspace

To see valuable data in this workspace, we recommend you connect the following adapters:

Workspace Assets and Modules

📘

Note

Each workspace has its own use-case-focused navigation menu on the left. The assets and modules available from this menu depend upon your access configuration.

You can access the following assets directly from this workspace:

Vulnerability Instances

Devices

Vulnerabilities.

See Using Workspaces to learn how to generally access, navigate, and use workspaces.

Use Cases this Workspace Helps You Fulfill

The Exposure Overview's Home page displays charts and KPIs of special interest, divided into functional areas that help you focus on specific use-case information.

The data displayed on the charts relies mainly on the Risk Score settings you have defined for your assets. If needed, you can always change those settings to get the most accurate risk picture.

General Risk Picture

The Overview section at the top of the page provides a simple, straightforward view of your most critical issues and assets. It also includes statistics on changes that occurred over the past 7 or 30 days. This way you can see where you currently stand risk-wise and understand what to expect in the near future.

The Overview displays the following information:

  • Current number of Critical, Active (open) Vulnerability Instances - the most urgent assets to take care of
  • Current number of devices at risk (devices with Critical Axonius Risk Score)
  • The MTTR (Mid Time to Resolution) of all closed Vulnerability Instances with a Preferred Age date. This field indicates how many days ago the vulnerability was open, and its value is calculated by deducting the Preferred First Seen date from the Preferred Last Seen date.

Identifying Risks Quickly

Comprehensive, up-to-date Risk Score data help you recognize risks ahead of time, prioritize remediation efforts, and ensure your teams focus on the highest-impact issues.

The workspace shows Risk Score data, both current data and statistics across your assets over time. For example: the Average Risk Score per device, which represents your Organizational Risk Score.

Time to Resolution Information

The most severe risks require the fastest reaction. Therefore, a key objective is that the MTTR of high-risk Vulnerability Instances will be significantly lower than the MTTR of low-risk Vulnerability Instances. Exposures Overview helps you track and visualize your MTTR and SLA efforts, and see whether they are meeting your organization’s objective.

For example, you can use the charts in this section to see the MTTR of Vulnerability Instances assets, grouped by Risk Levels.


Recognizing Vulnerabilities Out of SLA

Reducing Critical Vulnerability Instances that are out of SLA is a key objective, mirroring the performance goals associated with Time to Resolution metrics. The primary focus is to ensure that non-compliant instances are kept to a minimum.

For example, you can use the charts in this section to see which Vulnerability Instances are out of SLA and compare the SLA data between different Risk Levels. This view helps you understand whether your resolution efforts are meeting the defined SLAs.

To see the actual out-of-SLA assets, click the number displayed in the chart. The relevant Assets table opens in a new tab, and from there, you can perform the following actions:

Exploring Open Vulnerabilities in Context

To understand the scope and impact of risks, it’s important to be able to zoom in on specific connections between assets and risks.

Use the charts in this section to see the number of open (unresolved) vulnerabilities in your organization, grouped by different parameters as demonstrated below.

For example, the Critical Risk by Vulnerability ID chart shows Critical Vulnerability Instances grouped by Vulnerability ID. Hover over an ID to see its percentage out of the total vulnerability count.

As demonstrated below, the CVE-2024-4358 vulnerability has 740 instances across the environment, which are 10.22% of all vulnerabilities:

exp_mng3

Click on a Vulnerability ID to view the Vulnerability Instances Assets page filtered by this specific vulnerability. This way you can see all of its instances, including the asset types and hostnames it exists on.

exp_mng4

After you zeroed in on this vulnerability, you can take the following actions:

  • Explore a specific instance of this vulnerability on its Asset Profile page
  • Compare this vulnerability’s Risk Score across the assets it exists on
  • Implement remediation workflows such as opening tickets and cases

New VIs

This section shows all new Vulnerability Instances, with a specific focus on Critical, Active Vulnerability Instances.

The data is displayed as an Assets Table. Click View All Results to navigate to the Vulnerability Instances Assets page.

exp_mng5