Skip to main content

The Risk Management dashboard

The Risk Management dashboard provides an overview of your network security and risk assessment formation.

You can access this dashboard by selecting Risk Management from the default views of the ASM Dashboard.

Each widget can be individually configured. Hovering over a widget displays the buttons that enable you to customize it:

  • Move - you can move any widget to a new position by using move.png.

  • Resize - you can resize any widget by using reasize.png.

  • Close - you can close any widget by using close.png.

Selecting Screenshot_2025-09-04_115449.png from the upper right area of the dashboard displays a list of all the available widgets. You can quickly choose which of these should be displayed by selecting or clearing their respective check boxes.

Screenshot_2025-09-04_115443.png

After editing a view, you can also save it as a custom view that can be readily accessed from Smart Views. To do so, simply select Save as from the upper right section of the ASM Dashboard.

The data displayed on this page is organized in several widgets:

Company state

The Company state widget shows your organization’s overall risk score, illustrated by the outer arc. It also displays individual scores for resources, identities, and modifiers, each represented on the inner arc.

company_state.png

By default, Identity monitoring is disabled, but you can enable it using the switch on the Company state widget.

Note

If Identity monitoring is disabled, the widgets related to identities and identity risks no longer display data.

Your total company risk score is calculated based on the resource, identity, and industry risk scores.

The Score breakdown section shows how your company’s overall risk score is built. It combines two parts:

  • A base score that reflects the level of risk associated with resources and identities found in your environment.

  • A modifiers score associated with the number of unresolved CVEs found in your environment that are already actively exploited in your industry.

3.png

Note

Running an on-demand Risk scan on a new target endpoint will influence the overall score. The results are kept for 90 days, or until the next scan.

Note

For accurate information, make sure the industry assigned to the company in the My Company page is accurate.

Important

For more details about user data processing, refer to Identity risk data collection.

The Company risk distribution section provides a breakdown of the existing risks in your company, grouped per type:

Company_Risk_Distr.png

For more information on each risk type, you can access the following links:

Score over time

This widget is a histogram that displays the weekly evolution of your company risk score from the last seven days, until 12 AM of the current day.

Note

Please note that the time configured in your GravityZone account is used for this measurement.

You can configure the date range you want to view from the drop-down menu in the top left part of the widget.

4.png

You can also view more details on the score evolution for each point in the chart by hovering over it.

score_over_time_hover.png

Scanned resources

This widget informs you of the number of scanned and monitored resources, along with a breakdown by resource type.

5.png

If you click an individual finding in this widget, it is opened in the Resources page, in a new tab, where you may take appropriate actions to mitigate this risk.

Local resources by OS

This widget displays the servers and workstations in your infrastructure, sorted by the operating system they use (Linux, MacOS or Windows.)

7.png

Scanned identities

Similar to Scanned resources, this widget uses a donut chart to show the number of scanned identities, along with a breakdown by identity type.

6.png

If you click an individual finding in this widget, it is opened in the Identity risks page, in a new tab, where you may take appropriate actions to mitigate this risk.

Top findings by severity

This widget displays the top results for findings that triggered a risk alert after scanning resources, ordered by severity.

8.png

If you click an individual finding in this widget, it is opened in the Findings page, in a new tab, where you may take appropriate actions to mitigate the risk.

If you click the View all link, the entire list of findings is opened in the Findings page, in a new tab.

Note

For more details on findings, refer to Indicators of Risk.

Vertically resizing the widget is limited to displaying 20 lines maximum.

Top findings by impact

This widget displays the top results for findings that triggered a risk alert after scanning resources, ordered by impact.

findings_impact.png

If you click an individual finding in this widget, it is opened in the Findings page, in a new tab, where you may take appropriate actions to mitigate the risk.

If you click the View all link, the entire list of findings is opened in the Findings page, in a new tab.

Note

For more details on findings, refer to Indicators of Risk.

Top vulnerabilities by severity

This widget displays the top results for known application vulnerabilities that triggered a risk alert after scanning resources, ordered by severity.

vuln_sev.png

Clicking an individual item in this widget opens it in the Vulnerabilities page in a new tab, where you may take appropriate actions to mitigate this risk.

If you click the View all button, you will view the entire list of vulnerabilities in the All vulnerabilities smart view of the Vulnerabilities page, ordered by risk score.

Hovering over an individual device within the widget displays its risk score breakdown.

Top identity risks by impact

This widget displays the top results for potential risks caused by unintentional or reckless behavior of users active in your network, ordered by impact.

13.png

If you click an individual finding in the widget, it is opened in the Identity risks page, in a new tab, where you may take appropriate actions to mitigate the risk.

If you click the View all link, the entire list of findings is opened in the identity risks page, in a new tab.

Note

For more details about user data processing, refer to Identity risk data collection

Top identity risks by severity

This widget displays the top results for potential risks caused by unintentional or reckless behavior of users active in your network, ordered by severity.

identity_sev.png

If you click an individual finding in the widget, it is opened in the Identity risks page, in a new tab, where you may take appropriate actions to mitigate the risk.

Note

For more details about user data processing, refer to Identity risk data collection.

Vulnerabilities breakdown

This widget breaks down the vulnerabilities in your company, sorting them by the type of the application in which the vulnerability can be found - Application, OS, or Service.

14.png

Top vulnerabilities by impact

This widget lists the vulnerabilities in your company, sorted by impact.

12.png

Clicking an individual item in this widget opens it in the Vulnerabilities page, in a new tab, where you may take appropriate actions.

If you click the View all button, you will view the entire list of vulnerabilities in the All vulnerabilities smart view of the Vulnerabilities page, ordered by risk score, descending.

Hovering over an individual item in the widget displays the container image number and the total number of affected resources.

Top resources at risk

This widget shows the resources that are most at risk in your company.

15.png

If you click an individual finding in this widget, it is opened in the  Resources page, in a new tab, where you may take appropriate actions to mitigate this risk.

If you click the View all button you will view the entire list of resources in the All resources smart view of the Resources page, ordered by risk score. Hovering over an individual device within the widget displays its risk score breakdown.

Top identities at risk

This widget displays the most vulnerable identities in your environment, according to the overall score calculated after analyzing their behavior and activity.

16.png

If you click an individual identity in this widget, it is opened in the Identity risks page, in a new tab, where you may take appropriate actions that are present for that identity.

If you click the View all link, the Identity risks page is opened in a new tab.

Top resources involved in incidents

This widget highlights the top resources that have been involved in incidents, listing their name, risk score and amount of incidents in which the resource was involved.

17.png

If you click an individual finding in this widget, it is opened in the Resources page, in a new tab, where you may take appropriate actions to mitigate the risks present on that resource.

If you click the View all button, you can view the entire list of incidents in the Resources page.

Oldest vulnerable applications

This widget lists the applications that are oldest and most vulnerable, listing their risk score, number of vulnerabilities and date they were first seen on.

18.png

Vulnerabilities by severity

This widget lists all vulnerabilities by their severity, displaying their total number and how many are being actively exploited. For each vulnerability you can view its name as shown in the CVE database, a link that leads to the CVE database page, and its risk score.

19.png

If you click the View all button, you can view the entire list of vulnerabilities in the Vulnerabilities page.

Vulnerabilities by application

This widget lists all vulnerabilities by the application they have been discovered on, their total number, and how many are being actively exploited. For each application, you can view its name as shown in the CVE database, the number of vulnerabilities per each application, and the associated risk score.

20.png

If you click the View all button, you can view the entire list of vulnerabilities in the Vulnerabilities page.