Vulnerabilities
WatchDog Security Help Center
Admin Guide
Docs Home
Admin Guide
User Guide
MSP Guide
Getting Started
Create Your Free Organization
Domain Reservation
Company Management
Manage Branding
Delete Organization
Notification Center
Organization Events
User Events
Configure Notification Settings
User Notification Override
Posture Management
View Integrations
Configure Automated Integrations
Manage Automated Monitors
Configure Manual Integrations
Manage Manual Monitors
WatchDog University
Assigning Courses using WatchDog University
Auditing Course Completion
Downloading a Certificate of Completion
Policy Management
Create Policy
Publish Policy
Track Policy Acceptance
Send Policy Reminder
Update Policy
Download Policy Version
Delete Policy
Retire Policy
Risk Management
Perform A Risk Assessment
View and Manage Risks in Risk Register
Create Manual Risk
Edit and Manage Risk
Manage Risk Tasks
Manage Risk Lifecycle
Vendor Management
Add Vendor
Track Security Events
Manage Vendor Documents
Perform Vendor Assessments
Classify Vendor Risk
Inventory
Add Inventory Item
Update Inventory Item
Auto Populate Inventory
Compliance Center
Add Compliance Framework
Edit Compliance Framework
Assigning Control Owners
Pause Monitors and Documents
Manage Compliance Documents
Schedule Audit
Automated Monitoring
Cross-Framework Reuse
Progress Tracking
Trust Center
Customize Trust Center
Manage Trust Center Access
Monitor Access Activity (Events)
Custom Domain Setup
Vulnerabilities
Centralized Vulnerability Tracking
Import Vulnerabilities
Create Manual Vulnerabilities
Assign And Collaborate On Vulnerabilities
Configure Time To Remediate (TTR)
Control Panel
Manage Support Access
Phishing Campaigns
Creating an Allowlist for Phishing Simulations in Microsoft 365
Configure Google Workspace Allowlist for Phishing Simulations
User Management
Add Users
Configure Directory Sync
Manage User Access
Assign Licenses
Manage Invites And Users
Change Account Owner
Reset 2FA
Integrations
Vulnerabilities
Centralized Vulnerability Tracking
Automatically collect and manage vulnerabilities from connected integrations. WatchDog continuously syncs findings from supported tools and centralizes them into a single view for tracking and remediation.
Who can use this feature?
All
Account Owners
and
Security Admins
Available on the
Free
,
Core
and
Business
plans
Track Automated Vulnerabilities
#
Vulnerabilities are automatically created when integrations with vulnerability support are enabled.
1
Sign in to WatchDog Security
Sign in to the
WatchDog Security Platform
.
2
Open Vulnerabilities Page
Navigate to the
Vulnerabilities
page from the sidebar.
3
View Synced Findings
Review vulnerabilities automatically synced from integrations in the
Open Vulnerabilities
table.
Supported Integrations
Connect integrations that support vulnerability scanning to automatically sync findings into WatchDog.
4
Filter Findings
Use filters such as
Severity
,
Source
, and
Status
to refine results.
5
Open Vulnerability Details
Click a vulnerability to view detailed information, including
CVSS
,
CVE
, and affected assets.
What Happens Next
#
Vulnerabilities from integrations are automatically synced into the platform.
Each finding is categorized by severity, source, and affected asset.
Users can assign and track remediation directly from the vulnerability record.
Troubleshooting
#
No Automated Vulnerabilities Found
If no vulnerabilities are visible:
Ensure integrations are properly configured and active
Verify the integration supports vulnerability syncing
Check if filters are hiding results (e.g.,
Status
,
Severity
)
Some integrations may require initial scan completion before data appears
Data Not Syncing
Modified at
2026-03-18 20:03:30
Previous
Vulnerabilities
Next
Import Vulnerabilities