cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Nils
Lansweeper Tech Support
Lansweeper Tech Support

TL;DR-Sweepy-Icon (1).png
This page explains how to create and manage custom views in Risk Insights to filter unnecessary information.


Risk Insights has been greatly improved in version 10.5.0.7. We recommend updating your installation if you are running a lower Lansweeper version to ensure an optimized experience.

As cybersecurity gains importance by the day, an organized list of the vulnerabilities affecting your devices becomes a crucial tool in any security officer’s arsenal.

Since more and more vulnerabilities are discovered, the list of Active vulnerabilities tends to grow as well. The Custom views feature allows you to filter unnecessary information from these views and select the data you want to examine further, covering your analytical needs.

With custom views, you can:

This feature is available in Pro and higher plans. It is available for a limited time for all users to try it out. For more information on plans, check out the pricing page.

Create a custom view

By default, a filter is applied to all vulnerabilities to only show those with a high confidence level. You can remove this filter to show vulnerabilities with a low confidence level as well. 
  1. Go to Risk Insights > Active vulnerabilities, and select Customize view.
    Custom vulnerability views 5.png
  2. Under Fixed columns, toggle the fixed columns that you want to display On or Off.
  3. Under Scrollable columns, hover over a column and select X to remove it, or select and hold the column to reorder it.
  4. Under Available columns, use the search to find the column you want to add, then click to add it to your custom view.
  5. Select Apply.
  6. If you're happy with the view, select Unsaved View > Save view and configurations. If you'd like to revert to the previous view, select Restore the default value.
    Custom vulnerability views 8.png
  7. Enter a name for your view. You can also add a description.
  8. Select Save.

Your view is added to Risk Insights > Custom view.

Sort by multiple columns

  1. Go to Risk insights > Active vulnerabilities.
  2. Select a second column you want to sort vulnerabilities by. Vulnerabilities are sorted by Risk score by default.
  3. Optionally, select more columns to sort your list of vulnerabilities by. You can sort vulnerabilities by up to 4 different columns at the same time. 
    Your list of vulnerabilities will be sorted by the selected columns, prioritizing those selected first.
  4. Select Unsaved View > Save view and Configurations.
  5. Enter a name for your view. You can also add a description.
  6. Select Save.
    You can remove a sorted column by selecting X.

Create an advanced filter view

  1. Go to Risk Insights > Active vulnerabilities, and select Advanced filter view.
    Custom vulnerability views 6.png
  2. Type in a field name or select the arrow to view a list of options.
  3. Select an operation.
  4. Enter a value. Either:
    • Choose from the list of predefined values.
    • Create new values by selecting Change. Enter your value then select Add filter value if you wish to add additional values, and select Apply values once you're done.
  5. Select + to add additional filters.
  6. Select Apply.
  7. If you're happy with the view, select Unsaved View > Save view and configurations. If you'd like to revert to the previous view, select Restore the default value.
  8. Enter a name for your view. You can also add a description.
  9. Select Save.

Your view is added to Risk Insights > Custom view.

Manage a custom view

  1. Go to Risk Insights > Active vulnerabilities, and select Custom views.
  2. Select the view you wish to edit.
  3. Select Custom view. From there, you have a variety of options to manage the custom view.
    Custom vulnerability views 9.png
All saved views are private by default. If you want to share your views with other users, you can use the Share view option to grant users access to your view.

Export a view

  1. Go to Risk Insights > Active vulnerabilities, and select Export view.
    Custom vulnerability views 7.png
  2. Select the export type:
    • Standard export: Download the first 10,000 results automatically. Your file will start downloading once you select Export.
    • Full export: Download all of the results. You'll receive an email with the attached file once you select Export.
  3. Select CSV file or XSLX file for the file type.
  4. Select Export.
    Export report 2.png

Was this post helpful? Select Yes or No below!
Did you have a similar issue and a different solution? Or did you not find the information you needed? Create a post in our Community Forum for your fellow IT Heroes!
More questions? Browse our Quick Tech Solutions.


Was this article helpful? Yes No
100% helpful (1/1)

New to Lansweeper?

Try Lansweeper For Free

Experience Lansweeper with your own data.
Sign up now for a 14-day free trial.

Try Now

New to Lansweeper?

Try Lansweeper For Free

Experience Lansweeper with your own data.
Sign up now for a 14-day free trial.

Try Now
Version history
Last update:
‎06-20-2024 11:55 AM
Updated by: