CSPM findings indicate whether a given resource passed or failed evaluation against a specific security guideline. Each finding includes metadata about the resource evaluated and the security guideline used to evaluate it. Each finding's result (
fail) indicates whether a particular part of your infrastructure meets a security guideline.
By default, the Findings page lists all findings, without grouping or filtering.
- Click Group findings by: to open a list of fields by which you can group findings. Select one of the suggested group-by fields, or click Custom field to choose your own group-by field.
- When grouping is turned on, click a group to expand it and examine all findings within that group.
- To turn off grouping, click Group findings by: and select None.
You can filter findings data in two ways:
- The KQL search bar: For example, search for
result.evaluation : failedto view all failed findings.
- In-table value filters: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons.
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:
- Columns: Select the left-to-right order in which columns appear.
- Sort fields or n fields sorted: Sort the table by one or more columns, or turn sorting off.
- Fields: Select which fields to display for each finding. Selected fields appear in the table and the Columns menu.
You can also click a column's name to open a menu that allows you to perform multiple actions on the column.
To remediate failed findings and reduce your attack surface:
First, filter for failed findings.
Click the arrow to the left of a failed finding to open the findings flyout.
Follow the steps under Remediation.
Remediation steps typically include commands for you to execute. These sometimes contain placeholder values that you must replace before execution.
You can create detection rules that detect specific failed findings directly from the Findings page.
- Click the arrow to the left of a Finding to open the findings flyout.
- Click Take action, then Create a detection rule. This automatically creates a detection rule that creates alerts when the associated benchmark rule generates a failed finding.
- To review or customize the new rule, click View rule.
On this page