Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Emailing Assigned Vulnerability Reports to Technical Users

In JSA Vulnerability Manager, you can send an assigned vulnerabilities report to the technical contact for each asset.

An emailed report reminds your administrators that vulnerabilities are assigned to them and require remediation. Reports can be scheduled monthly, weekly, daily, or hourly.

You must complete the following tasks:

  1. Assign a technical user as the owner of asset groups. For more information, see Assigning a Technical User As the Owner Of Asset Groups

  2. Scan the assets that you assigned the technical owner to.

  3. Create and save a vulnerability search that uses the Technical Owner Contact parameter as an input. For more information, see Searching Vulnerability Data

  1. Click the Reports tab.
  2. On the toolbar, select Actions >Create.
  3. Click Weekly and then click Next.
  4. Click the undivided report layout that is displayed on the upper left section of the report wizard and click Next.
  5. Type a Report Title.
  6. In the Chart Type list, select Asset Vulnerabilities and type a Chart Title.
  7. If a technical contact owner is responsible for more than five assets and you want to email all asset information, increase the value in the Limit Assets To Top list.

    By using the Assets tab, you must ensure that the same technical contact owner is assigned to each asset that they are responsible for.

  8. In the Graph Type field, select AggregateTable.

    If you select any value other than AggregateTable, the report does not generate a vulnerability sub-report.

  9. In the Graph Content pane, click Search to Use and select your saved technical contact vulnerability search then click Save Container Details.
  10. Click Next and select your report output type.
  11. In the report distribution section of the report wizard, click Multiple Reports.
  12. Click All Asset Owners.
  13. Click Load asset owners to display all list of the technical users contact details.

    You can remove any technical users that you do not want to email with a list of assigned vulnerabilities.

  14. On the Reports list, select the report that you created and on the toolbar, select Actions >Run Report.