How to submit a remediation request in the RiskSense platform.
The remediation workflow serves as acknowledgement that the vulnerability has been fixed or removed. For cases where an organization remediates a vulnerability, the RiskSense platform provides an option to mark that finding as a Remediation (RM).
To submit a remediation, go to either the Network > Host Findings or Application > Application Findings pages. For this example, we will show you how to submit a remediation using the Network > Host Findings page.
Select the finding(s) you want to mark as remediated by clicking the check box in the page’s first column. You may select several vulnerabilities at a time for remediation.
Click the Workflow button.
In the Workflow drop-down menu, click Request under the Remediation category. This option can be used for single and multiple vulnerabilities.
You may also select a single vulnerability and right click the line item to select workflow options from the pop-up menu. Note that using the right-click option only works for a single row, as designated in the screenshot below.
Clicking Workflow > Remediation > Request brings up the Request Remediation window.
The following list describes the fields that appear in the Request Remediation window.
- Description: Description of the remediation.
- Expiration Date: Date that the remediation should expire. If the date is blank, the remediation will not expire. You may enter your own expiration date or select one of the presets underneath the expiration date field.
- Drag Files Here: Allows users to upload documents or images supporting the remediation request.
Once the form is complete, click Submit. Once a user requests a remediation, the vulnerability state will change to RM Requested, as shown below.