Risk incidents widget

Information about tracking vulnerable apps from the Risk incidents widget.

Devices report all app vulnerabilities to the MaaS360 Portal. If those incidents meet the Risk Rule criteria set by the administrators, MaaS360 generates a risk incident in the dashboard.

Follow these steps to track vulnerable apps from the Risk incidents widget on the Security Dashboard:
  1. Go to Security > Security Dashboard.
  2. In the Risk incidents widget, click the Affected devices link corresponding to the Application security risk incident:
    Application security risk incident
    The affected devices are displayed.
    Affected devices page for Application security risk incident
  3. Click on the username.

    The User Summary page displays all risk incidents against the affected devices of the user.

    Alternatively, you can navigate to the user's Summary View page from Security > Security Dashboard > Top Users with Risk Incidents > Top risky users.

    Device details for application security risk incident
  4. Click Application security incident for a device to view more details about that risk incident.

    A slide-over window opens to display the top risky apps installed on the device.

    App details for application security risk incident
  5. Click on an application name to view additional details, including the complete security assessment, CVE, the overall impact of detected vulnerabilities on the application, and the list of affected devices.

    You can view details of the following devices by clicking on the required tab.

    • User's devices: Lists the security assessment for the user's devices that are impacted by the vulnerable app.
    • All devices: Lists the security assessment for all the devices in an organization that are impacted by the vulnerable app.
    Device details for application security risk incident
  6. You can remediate the app vulnerabilities by updating or uninstalling them from devices. Additionally, you can send notifications to devices about app vulnerabilities and the remediation actions performed. For more information, see Remediating vulnerable apps from the Risk Incidents widget.