Security Exposure Management Workspace remediation task rule examples

  • Release version: Zurich
  • Updated July 31, 2025
  • 1 minute to read
  • Examples of remediation task rules using vulnerability and risk, or impact, or configuration item (CI).

    Remediation task rule to group high risk Java and Oracle vulnerable items

    This example shows a walk-though of the rule that groups Java and Oracle findings by vulnerability and assigns them to their respective support groups.

    Figure 1. Remediation task rule example
    Vulnerable items grouped by business impact and risk score, assigned to support teams

    Right-click in the header to Save.

    Remediation task rule to group all high impact vulnerable items by Vulnerability and CI support group

    This example shows the form field settings for a group rule for high impact findings that assigns them to the CI support group.

    Grouped by high impact vulnerability

    Remediation task rule to group all the high risk vulnerabilities on an external-facing CI in a German data center

    This example shows the form field settings for a group rule for high risk vulnerabilities on external facing CIs in a German data center. They are assigned to the German data center assignment group.

    Group by high risk vulnerabilities and external-facing CIs in a German data center