Requesting a Remediation

How to submit a remediation request in the RiskSense platform.

The remediation workflow serves as acknowledgement that the vulnerability has been fixed or removed. For cases where an organization remediates a vulnerability, the RiskSense platform provides an option to mark that finding as a Remediation (RM).

To submit a remediation, go to either the Network > Host Findings or Application > Application Findings pages. For this example, we will show you how to submit a remediation using the Network > Host Findings page.

Host Findings Menu Location-2

Select the finding(s) you want to mark as remediated by clicking the check box in the page’s first column. You may select several vulnerabilities at a time for remediation.

Remediation Request - Selecting Host Findings

Click the Workflow button.

Remediation Request - Workflow Button Location

In the Workflow drop-down menu, click Request under the Remediation category. This option can be used for single and multiple vulnerabilities.

Remediation Request - Request Remediation Menu Location

You may also select a single vulnerability and right click the line item to select workflow options from the pop-up menu. Note that using the right-click option only works for a single row, as designated in the screenshot below.

Remediation Request - Request Remediation Right Click Menu Location

Clicking Workflow > Remediation > Request brings up the Request Remediation window.

Remediation Request - Request Remediation Window

The following list describes the fields that appear in the Request Remediation window.

  • Description: Description of the remediation.
  • Expiration Date: Date that the remediation should expire. If the date is blank, the remediation will not expire. You may enter your own expiration date or select one of the presets underneath the expiration date field.
  • Drag Files Here: Allows users to upload documents or images supporting the remediation request.

Once the form is complete, click Submit. Once a user requests a remediation, the vulnerability state will change to RM Requested, as shown below.

Remediation Request - State Changed to RM Requested