- January 18, 2024: New Findings page overview specific to the Cyber Insurance app.
Findings are the culmination of observed internet traffic and configurations. They’re recorded on the Bitsight platform as events and records. Findings are presented in a table view that provides a single place to sort, filter, analyze, comment on, track your client’s remediation efforts, and export Bitsight findings.
|Add the company to a folder:
|Select Actions ➔ Add to Folder at the top-right of the Findings page.
|Select Actions ➔ Add/View Notes at the top-right of the Findings page.
|Comment on the finding (finding comments):
|Select the Comment option at the right of the finding in the table.
|Customize the data in the table:
|Use the Customize columns button at the top-right of the table.
|Download the findings table (.csv):
|Filter the table:
Generate reports and assessments, including:
|Select Reports and Assessments at the top-right of the Findings page.
|Invite the client to collaborate via the Enable Access Program:
|Select the Client Access ➔ Enable Client Access dropdown button at the top-right of the Findings page.
|Do a text search using the search bar at the top-right. Text with matches are highlighted. See search fields.
|See Finding Details sheet:
|Select a finding from the table in the Findings page.
|See prior collaboration efforts via the Enable Access Program:
|Select the Client Access ➔ Prior Requests (
#) dropdown button at the top-right of the Findings page.
|See the Service Providers sheet:
|Select Actions ➔ Service Providers at the top-right of the Findings page.
|See the Products sheet:
|Select Actions ➔ Products at the top-right of the Findings page.
|Unsubscribe from the company:
|Select Actions ➔ Unsubscribe at the top-right of the Findings page.
Fields & Finding Details Sheet
|The Bitsight risk vector.
|The IP address or domain that identifies the asset.
|The date when this finding was first observed.
|The date when this finding was last observed.
The Details tab in the Finding Details sheet may contain the following sections:
- Details: Details about the finding.
- Remediations: Finding details and remediation tips.
- Comments: Finding comments.
The finding details in the table and Finding Details sheet vary depending on the risk vector. See details for:
- Compromised Systems Findings
- File Sharing (User Behavior Forensics)
- Public Disclosures
|Description & Values
|Applicable Risk Vectors
|Select all risk vectors in a risk category or individual risk vectors.
Include findings that were first seen in the past:
Include findings that were last seen in the past:
|Web App Sec Tests
|Filter by assessment categories.
|Web Application Security
Filter by refresh status:
|Select Diligence risk vectors. See refresh by risk vector.
Filter by finding grade:
|Diligence Risk Vectors
|Impacts Risk Vector Grade
|Lifetime range (
|See lifetime by risk vector.
Filter by finding severity:
|Compromised Systems, Diligence (except Mobile Application Security), and File Sharing risk vectors.
Filter by asset importance:
|Filter by Bitsight severity across a CVSS score range.
# of days to maximum
# of days.
|All. See lifetime by risk vector.
|Patching Cadence: Remediated?
|Filter by malware family.
|Compromised Systems risk vectors.
|File Sharing Category
|Filter by file sharing category.
|Pass / Fail Test
Filter by mobile application analysis results (testing results).
|Mobile Application Security