Security Center can detect and fix Windows software vulnerabilities.

Synchronized with the security updates released on Microsoft's official website, Security Center can effectively detect important vulnerabilities and notify you of potential threats. This prevents attackers from exploiting Windows software vulnerabilities to compromise the security of your server.

Note Security Center Basic only supports vulnerability detection. To fix vulnerabilities, you need to activate Security Center Enterprise. For more information about the features provided by Security Center Basic and Enterprise, see Features.

Procedure

  1. Log on to the Security Center console.
  2. Choose Vulnerabilities > Windows Software Vulnerabilities.
  3. On the Windows Software Vulnerabilities page, view security bulletins about the vulnerabilities detected by Security Center, view vulnerability details, fix vulnerabilities, verify whether a vulnerability is fixed, search vulnerabilities by severity level and status, add vulnerabilities to the whitelist, and ignore vulnerabilities.
    • View vulnerability details

      Click a vulnerability name to view details. On the vulnerability details page, you can view a description of the vulnerability, its severity level, assets affected by this vulnerability, and the vulnerability status. You can also choose to fix the vulnerability, verify whether it is fixed, or ignore it.

      The vulnerability details page also displays information about Pending vulnerability and assets that are affected by these vulnerabilities. You can easily analyze and handle these vulnerabilities.

      Vulnerability priorities (urgency levels) are color coded for easy identification. Red indicates high priority. Orange indicates medium priority. Gray indicates low priority.

      Note We recommend that you immediately fix high priority vulnerabilities.
    • Verify vulnerabilities

      On the vulnerability details page, you can select one or multiple vulnerabilities and click Verify to verify whether the selected vulnerabilities are fixed.

      After you click Verify, the vulnerability status is changed to Verifying. It takes several seconds to verify vulnerabilities.

    • Fix vulnerabilities

      On the vulnerability details page, you can select one or multiple vulnerabilities and click Fix to fix the selected vulnerabilities.

    • Search vulnerabilities

      On the Windows Software Vulnerabilities page, you can search vulnerabilities by vulnerability name, severity level (high, medium, and low), or vulnerability status (handled, unhandled).

      Note You can also fuzzy search vulnerabilities by name.
    • Add vulnerabilities to the whitelist

      On the Windows Software Vulnerabilities page, you can select one or multiple vulnerabilities and click Add to Whitelist to add the selected vulnerabilities to the whitelist. After a vulnerability is added to the whitelist, Security Center does not send alarms when this vulnerability is detected.

      Whitelisted vulnerabilities are removed from the vulnerability list on the Windows Software Vulnerabilities page. You can click Settings in the upper-right corner and view these vulnerabilities in the Whitelisted Vulnerabilities table.

      If you want Security Center to detect and send alarms on whitelisted vulnerabilities again, select a vulnerability and click Remove to remove this vulnerability from the whitelist on the Settings page.

    • Ignore vulnerabilities

      On the Windows Software Vulnerabilities page, you can select one or more vulnerabilities and click Ignore to ignore the selected vulnerabilities.

      Note After you ignore a vulnerability, the vulnerability status is changed to Handled. If you want Security Center to notify you of this vulnerability again, select this vulnerability in the Handled vulnerability list and click Unignore.
    • Export vulnerabilities
      On the Windows Software Vulnerabilities page, you can click the Export icon to export records of all vulnerabilities to your local computer. The exported file is in Excel format.
      Note It may take a few minutes to export vulnerability records depending on the data size.
    • On the vulnerability details page, you can click to save multiple vulnerabilities to a group. This allows you to track vulnerabilities by group.