| | |
|---|
| Vulnerability detections by vulnerabilities | The number of vulnerability detections by vulnerabilities |
| Vulnerability detections (High Cardinality) | The number of vulnerability detections (High Cardinality) |
| Top Ten Devices with the Most out of SLA Vulnerability Detections | The 10 devices with the most out of SLA vulnerability detections |
| Out of SLA detections on the worst 50 devices | The out of SLA vulnerability detections on the 50 devices with highest number of out of SLA vulnerability detections |
| Vulnerability detections out of SLA | The number of vulnerability detections that are out of SLA |
| Top Ten Devices with the Most Vulnerability Detections | The 10 devices with the most vulnerability detections |
| Top Ten Unique Vulnerabilities with the Most Detections | Top ten unique vulnerabilities with the most vulnerability detections |
| Vulnerability detections that satisfy SLA | The number of vulnerability detections that satisfy SLA |
| Vulnerability detections with SLA | The number of vulnerability detections included in SLA analysis |
| | The number of vulnerability detections |
| Devices with 80% of the total out of SLA detections (device/region) | The smallest number of devices that account for 80% of the total out of SLA vulnerability detections (device/region) |
| Devices with 80% of the total out of SLA detections | The smallest number of devices that account for 80% of the total out of SLA vulnerability detections |
| Devices with out of SLA detections | The number of devices that have out of SLA vulnerability detections |
| Devices with vulnerability detections | The number of devices with vulnerability detections |
| | The number of unique vulnerability signatures |
| Average age of vulnerability detections | The average age (days since first detection on device) of vulnerability detections |
| New vulnerability detections in influx | The percentage of vulnerability detections that satisfy SLA |
| Out of SLA detections on the worst 50 devices | The percent of out of SLA vulnerability detections found on the 50 devices with highest number of out of SLA vulnerability detection |
| Vulnerability detections out of SLA | The percent of vulnerability detections that are out of SLA |
| Devices with 80% of the total out of SLA detections (device/region) | The smallest percent of devices that account for 80%of the total out of SLA vulnerability detections (device/region)
|
| Devices with 80% of the total out of SLA detections | The smallest percent of devices that account for 80% of the total out of SLA vulnerability detections |
| Devices with out of SLA detections | The percent of devices with detections that have out of SLA vulnerability detections |
| Device coverage and Vulnerabilities with owner phishing tests | The number of devices with vulnerabilities and who’s owner has received a phishing test |
| Vulnerability detections with device coverage information | The number of vulnerability detections on devices (includes devices tool coverage information) |
| Vulnerability detections on devices hosting applications | The number of vulnerability detections on devices hosting an application |