Usage guide: Application vulnerability management

circle-exclamation

This library pack helps IT and security teams:

  • Gain clear visibility into vulnerable binaries and where they are being used.

  • Standardize vulnerability tagging for consistent remediation.

  • Target devices that actually executed vulnerable binaries, improving efficiency.

  • Use workflows and campaigns to drive user engagement during vulnerable application removal.

Library pack uses

circle-info

Jump to Use cases on this page to see relevant scenario applications.

Use the library pack content for the following purposes.

Gaining visibility into vulnerable application usage

With the help of the Application vulnerability management dashboard, and after manually tagging vulnerable products, you can see all endpoints executing vulnerable binaries. The dashboard provides an overview of the number of vulnerable products and devices running them, as well as breakdowns by location, organizational department and more. This information enables you to quickly assess the impact of the vulnerability.

Engaging with users to confirm the removal of vulnerable applications

With the Vulnerable application removal assessment workflow and its associated campaigns, users can be informed of vulnerable products on their devices, alternative or updated products can be suggested where available, and permission to remove the vulnerable products can be requested.

Use cases

In addition to the relevant use cases covered below, you may uncover other troubleshooting scenarios specific to your environment.

Tagging vulnerable applications

In the Application vulnerability management dashboard, on the Overview tab, apply filters to Product name and Versions to indicate the vulnerable product.

Next, check the Vulnerability catalog widget, which displays the product name, the devices running the product, the associated binaries and the versions. From the action menu, select Drill down to binaries.

In the drill-down results, select the vulnerable binaries and click Edit.

Finally, enter the values for the custom fields based on your case.

  • Vulnerable: This manual custom field indicates whether a specific binary version is considered vulnerable. It should be populated with a Yes value if your vulnerability detection report indicates this.

  • Vulnerability severity: This manual custom field indicates the severity level of a vulnerability affecting a specific binary version. It should be populated based on information from your vulnerability detection report and can contain one of the following text values: Low, Mid or High.

  • Vulnerability exploitability: This manual custom field indicates whether the vulnerability affecting a specific binary version is known to be exploitable. It should be populated with Yes or No based on information from your vulnerability detection report. If exploitability is unknown or not specified, the field may remain empty.

  • Replacement application: This manual custom field is used to indicate whether a replacement application is available for a vulnerable application. The replacement application name should be entered here. If no replacement is available, the field should be left empty.

  • Replacement application link: This manual custom field may contain a link to an alternative application available on your organization’s internal self-service portal. It is used when a vulnerable application should be replaced rather than updated. The link should be entered without the https:// prefix.

  • Safe version: This manual custom field indicates the version of the application that is considered safe and not affected by the vulnerability. It should contain the version number as text based on your vulnerability detection report. If no safe version is available or specified, the field may remain empty.

  • Safe version link: This manual custom field may contain a link to the safe version of the application available on your organization’s internal self-service portal. It should be populated when a vulnerable application can be upgraded. The link should be entered without the https:// prefix.

Identifying vulnerable applications

This use case helps security and IT teams identify, prioritize, and assess vulnerable applications in the environment using vulnerability data enriched with Nexthink’s real-time device and usage insights.

Assess overall risk exposure

Start with the Overview tab to quickly understand the current risk level.

This tab highlights:

  • The number of high-risk applications (severity Mid/High and exploitable)

  • The number and ratio of devices affected

  • The trend of exposure over time

It also shows which applications drive the most risk based on device impact and execution activity.

Use this view to determine:

  • Whether vulnerable applications represent a significant risk

  • Which applications should be prioritized for investigation

Investigate high-risk applications

Move to the Vulnerability Details tab to analyze the most critical applications.

Focus on the high-risk section to identify applications that are:

  • Widely deployed across devices

  • Actively used (high execution activity)

  • Exposed for long periods of time

These are the applications that should be addressed first.

Understand remediation scope

In the same tab, review all vulnerable applications to understand the full scope of exposure.

This section shows:

  • How many applications can be upgraded, replaced, or removed

  • The number of affected devices per application

Use this to:

  • Estimate the effort required for remediation

  • Decide on the appropriate remediation strategy

Identifying impacted devices

This use case helps identify devices running vulnerable applications and quickly generate a list of them.

Select the scope

Start from either the Overview or Vulnerability details tab, depending on your objective:

  • Use the Overview tab to identify devices running high-risk applications

  • Use the Vulnerability details tab to focus on specific vulnerable applications (high-risk or general)

This allows you to define whether you want a broad high-risk view or a targeted application-level investigation.

Drill down to devices

From the selected widget (for example, Devices running high-risk products), use the Drill down to Devices option.

This opens a list of devices impacted by the selected scope, allowing you to see exactly where vulnerable applications are present.

Use the device list for action

The resulting device list can be used to:

  • Identify affected users and endpoints

  • Export data for reporting or further analysis

  • Create targeted remediation actions, such as:

    • Configuration management collections

    • Remote actions.

Engaging with users to confirm the removal of vulnerable products

This use case helps IT and security teams engage end users to confirm remediation actions for vulnerable applications and collect feedback to drive follow-up actions.

Automatically detect vulnerable applications

A scheduled workflow continuously identifies devices running vulnerable applications based on the defined vulnerability tagging fields.

Depending on the available remediation information, the workflow automatically triggers one of the following user campaigns:

  • Remove the vulnerable application

  • Replace it with an approved alternative from the self-service portal

  • Upgrade it to a safe version from the self-service portal

Collect user responses

Users are prompted to confirm their intended action directly through the campaign. They can:

  • Confirm remediation (remove, replace, or update)

  • Indicate that remediation is not confirmed

  • Request IT support

If support is requested, the workflow can automatically create an ITSM ticket and notify the user.

Review responses and plan actions

All responses are aggregated in the Remediation progress tab, where teams can view:

  • Response rates per campaign type

  • User-selected actions per application

This allows teams to:

  • Identify devices where remediation is confirmed and proceed with automated actions (e.g., remote uninstall or update)

  • Detect cases where remediation is not confirmed and plan follow-up or escalation

  • Prioritize support requests and handle them through ITSM workflows

Assessing user response

This use case helps IT and security teams monitor and evaluate user responses to remediation actions for vulnerable applications, enabling more effective follow-up and remediation planning.

Review remediation engagement

Start with the 'Remediation progress' tab to understand how users are responding to remediation requests triggered by automated workflows.

When vulnerable applications are detected, users are presented with a campaign asking them to update, replace, or remove the application, or request support.

The Remediation summary provides an overview of:

  • The total number of responses

  • The response rate per campaign type

Use this to assess overall user engagement and identify areas where additional communication may be needed.

Analyze user responses

Review the User-selected remediation actions section to understand how users responded.

Responses are categorized as:

  • Remediation confirmed – users indicated they will take action

  • Remediation not confirmed – users did not commit to remediation

  • Support requested – users require assistance from IT

This helps teams identify:

  • Which devices are ready for remediation actions

  • Which users may require follow-up or escalation

  • Where IT support involvement is needed

Plan remediation actions

Use the response data to define next steps:

  • Remediation confirmed: use the Drill Down to Devices option to generate a list of affected devices, create configuration management collections, and trigger remote actions to complete remediation.

  • Remediation not confirmed: plan additional communication or escalation

  • Support requested: review the generated IT support tickets and plan support activities accordingly.

circle-exclamation

RELATED TOPICS

Last updated

Was this helpful?