If you want to organize your daily work on ASM, you can use our To-Do List feature. Through this function, you can be aware of all the vulnerabilities assigned to you and have good tracking in your daily tasks. To access it, you just have to click on the To-Do List icon in the top bar or follow this link (/todos).
However, an initial question could be: How can we assign vulnerabilities to our team? Don't worry! Here we explain how.
First, you need to go to the Vulnerabilities section and select the type of vulnerability you want to treat.
After that, you must click on the specific location of the vulnerability you intend to assign to your team. Immediately, a pop-up window will appear, showing you three tabs, from which you need to select the one called Treatments.
There, you must fill in all the fields with the requested information. For example, in the Assigned field, you have to enter the email address of the developer or team member who will be in charge of fixing the vulnerability. Once you provide all the required information, you must click the Proceed button.
Right away, the new person responsible for fixing the vulnerability will receive an email notification telling them about the new assignment, specifying the type of vulnerability, the group and the location. Clicking the Go to finding button will redirect them to the Location section on the ASM.
The person who was assigned the task will be able to find the aforementioned To-Do List function on the top-right menu of the ASM, next to the megaphone icon. The number over the icon will tell them how many vulnerabilities are assigned to them. Clicking on the icon will allow them to see the vulnerability locations they are responsible for remediating.
Filtering your To-Do List
Filters are useful tools that allow you to analyze data quickly. The To-Do section is equipped with filters that can help you visualize the vulnerabilities that have been assigned to you according to specific attributes.
There are six filters. From left to right, the first one is Treatment. This field will let you filter vulnerabilities in terms of their assigned treatment. You can select one of the four possible treatments.
Next is Treatment Acceptance. This field will present you with two options corresponding to whether the request to accept a vulnerability, either temporarily or permanently, has been accepted or is still pending.
Up next is Search Tag. It is technically a search box where you can type the name of the tag by which you would like to filter the list. Further to the right is the Group Name filter. By clicking on it, you can select one of the groups you are part of to visualize the vulnerabilities you have been assigned from that group.
Moving to the next field is the Reattacks filter. It allows you to filter your to-do list by the status of treatment, which can be either Requested or Verified.
The last option is to filter by Report date (Range). For the purpose of filtering vulnerabilities reported within a date range, there is a start date and an end date field. You can type a specific date in each field to create the date range that you want to visualize.
If you want to clear all the filters that you have applied, simply click on the Clear Filters button.