Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
      • Overview
      • Activating a module
      • Working with a dashboard
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. Vulnerability Management (VM)
  3. Working with a dashboard

Working with the Vulnerability Management (VM) dashboard

Written by
Yandex Cloud
Updated at March 26, 2026

Note

This feature is in the Preview stage. To get access, contact tech support or your account manager.

To work with the dashboard, you need the security-deck.viewer role or higher for the folder containing the Vulnerability Management resources.

Security Deck UI
  1. Go to Yandex Security Deck.
  2. In the left-hand panel, select Vulnerability Management.
  3. At the top of the window, select the workspace.
  4. Review the Dashboard tab. It has the following sections:
    • Vulnerabilities: Contains the overall statistics of detected vulnerabilities, broken down by severity.
    • Artifacts with vulnerabilities: Shows the number of artifacts with detected vulnerabilities and the number of artifacts requiring attention.
    • List of alerts with threat type, status, and last update time info.
  5. To view alert details with an aggregated list of vulnerabilities:
    1. Select an alert from the list on the dashboard.
    2. In the sidebar that appears go through the following:
      • Overview: General vulnerability info, including description, severity, and classification.
      • Details: Technical information on affected resources, including registries, repositories, and image IDs.
      • Recommendations: Suggestions how to fix the vulnerability.
      • History: Chronological record of vulnerability detection and status updates.
  6. Use the filters at the top of the dashboard to refine the results:
    • By modification date: Select the time range for vulnerabilities.
    • By status: Filter vulnerabilities by status: In progress, Closed, Open.
    • Filters: Apply additional filtering by severity, threat type, or affected resources.
  7. To confirm, click Confirm scan in the top-right corner. This will start a new scan for artifacts and vulnerabilities within the defined scope.

Was the article helpful?

Previous
Activating a module
Next
Overview
© 2026 Direct Cursus Technology L.L.C.