Attack Vectors

Use these filters to remove vulnerabilities from the report that aren’t the highest priority so you can focus on what’s most critical to your organization. For example, remove vulnerabilities that are not exploitable because they were found on a non-running kernel or service.

Internet Facing Only - Toggle this filter On to include assets with IP addresses that could be exploitable. Our system tag named Internet Facing Assets includes a range of pre-defined IP addresses. We automatically tag assets that matches this pre-defined IP address range in the tag.

To view the complete range of IP addresses that are included in the Internet Facing Assets system tag, go to AssetView app, navigate to Assets > Tags and then select Internet Facing Assets tag. From the quick-action menu, select View and then click Tag Rule in the View mode to view the complete list of IP addresses defined in the tag.