Has Threat Filter Explained
Summary: How to use the “Has Threat” filter to find vulnerabilities that place your organization at risk
On the Host Findings and Application Findings pages, you can add the filter “Has Threat is exactly True” to find vulnerabilities that attackers have already used in the wild. Ivanti Neurons sets this property to “true” if a vulnerability has a known exploit, has been leveraged in malware or ransomware, or appears in an industry list of known exploited vulnerabilities (e.g. CISA KEV). Analysts can also manually add threats by mapping findings to a Proof of Exploitation (PoE) (For instructions on to create a PoE, visit Finding Article Overview).
Ivanti Neurons provides additional filters and dashboard widgets to help you prioritize vulnerabilities for remediation. On the Executive and Ransomware Dashboards, the Findings Prioritization Funnel, Weaponization Funnel, and Ransomware Funnel widget allow you to view a breakdown of the threat impact by risk level. You can use these widgets to identify the most critical unaddressed vulnerabilities.