cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

This documentation is for the new preview UI. It’s still being refined and is subject to change. For documentation for the old UI, see Knowledge Base.

Article link copied to clipboard
Updated
Published
2 min read

Resolving vulnerabilities is paramount to safeguarding your assets against potential threats. Lansweeper equips you with the tools to identify vulnerabilities across your network, but the next step is resolving those vulnerabilities.

Resolve software and OS vulnerabilities

  1. Select the vulnerability you want to resolve.

    • If the Patch information tabs contain links to external sources, follow the provided links and apply the necessary mitigation strategies.

    • If the Patch information tabs do not contain any information, check the References tab instead for mitigation recommendations.

    • Alternatively, you can wait until relevant patches or updates are detected by Lansweeper's sources.

  2. After applying mitigation strategies, rescan the affected assets.

During each rescan, Lansweeper re-evaluates the assets to check if the vulnerabilities have been resolved.
If a vulnerability has been mitigated, the asset will no longer be listed for that particular CVE. If it was the only affected asset, or if all affected assets have been fixed, Lansweeper will no longer show the CVE in your list of vulnerabilities, ensuring it remains accurate and current.

If you don’t want to manually inspect each vulnerability in your systems, consider using a patch management tool instead. For more information on our cybersecurity integrations, check out how Lansweeper integrates with your tech stack.

Resolve hardware vulnerabilities

In the case of hardware vulnerabilities, the most effective solution may be to replace the affected hardware component entirely. Should the vulnerability be mixed, try resolving the other category first.

For example: a vulnerability can be categorized as both Hardware and OS at the same time. This indicates that the asset is vulnerable due to a specific OS version running on a particular hardware model. In such cases, patching the OS vulnerability could potentially resolve the entire vulnerability.

After applying mitigation strategies, rescan the affected assets. During each rescan, Lansweeper re-evaluates the assets to check if the vulnerabilities have been resolved.
If a vulnerability has been mitigated, the asset will no longer be listed for that particular CVE. If it was the only affected asset, or if all affected assets have been fixed, Lansweeper will no longer show the CVE in your list of vulnerabilities, ensuring it remains accurate and current.