1. Vulnerabilities
WatchDog Security Help Center
Admin Guide
  • Docs Home
  • Admin Guide
  • User Guide
  • MSP Guide
  • Getting Started
  • Create Your Free Organization
  • Domain Reservation
  • Company Management
    • Manage Branding
    • Delete Organization
  • Notification Center
    • Organization Events
    • User Events
    • Configure Notification Settings
    • User Notification Override
  • Posture Management
    • View Integrations
    • Configure Automated Integrations
    • Manage Automated Monitors
    • Configure Manual Integrations
    • Manage Manual Monitors
  • WatchDog University
    • Assigning Courses using WatchDog University
    • Auditing Course Completion
    • Downloading a Certificate of Completion
  • Policy Management
    • Create Policy
    • Publish Policy
    • Track Policy Acceptance
    • Send Policy Reminder
    • Update Policy
    • Download Policy Version
    • Delete Policy
    • Retire Policy
  • Risk Management
    • Perform A Risk Assessment
    • View and Manage Risks in Risk Register
    • Create Manual Risk
    • Edit and Manage Risk
    • Manage Risk Tasks
    • Manage Risk Lifecycle
  • Vendor Management
    • Add Vendor
    • Track Security Events
    • Manage Vendor Documents
    • Perform Vendor Assessments
    • Classify Vendor Risk
  • Inventory
    • Add Inventory Item
    • Update Inventory Item
    • Auto Populate Inventory
  • Compliance Center
    • Add Compliance Framework
    • Edit Compliance Framework
    • Assigning Control Owners
    • Pause Monitors and Documents
    • Manage Compliance Documents
    • Schedule Audit
    • Automated Monitoring
    • Cross-Framework Reuse
    • Progress Tracking
  • Trust Center
    • Customize Trust Center
    • Manage Trust Center Access
    • Monitor Access Activity (Events)
    • Custom Domain Setup
  • Vulnerabilities
    • Centralized Vulnerability Tracking
    • Import Vulnerabilities
    • Create Manual Vulnerabilities
    • Assign And Collaborate On Vulnerabilities
    • Configure Time To Remediate (TTR)
  • Control Panel
    • Manage Support Access
    • Phishing Campaigns
      • Creating an Allowlist for Phishing Simulations in Microsoft 365
      • Configure Google Workspace Allowlist for Phishing Simulations
  • User Management
    • Add Users
    • Configure Directory Sync
    • Manage User Access
    • Assign Licenses
    • Manage Invites And Users
    • Change Account Owner
    • Reset 2FA
  • Integrations
  1. Vulnerabilities

Configure Time To Remediate (TTR)

Define remediation timelines based on vulnerability severity to track how quickly issues are resolved across your organization.
Who can use this feature?
All Account Owners and Security Admins
Available on the Free, Core and Business plans

Configure TTR By Severity#

1
Sign in to WatchDog Security
Sign in to the WatchDog Security Platform.
2
Open Vulnerabilities Page
Navigate to the Vulnerabilities page from the sidebar.
3
Open Settings
Click the Settings option within the Vulnerabilities module.
4
Set TTR Values
Define TTR values for each severity level such as Critical, High, Medium, and Low.
5
Save Configuration
Click Save to apply the TTR configuration.

What Happens Next#

TTR values are applied to vulnerabilities based on their severity.
The platform tracks remediation timelines against configured TTR targets.
Teams can measure performance based on how quickly vulnerabilities are resolved.

Troubleshooting#

TTR Not Applying To Vulnerabilities
If TTR is not applied:
Ensure TTR values are configured for all severity levels
Verify the vulnerability has a defined severity
Confirm changes were saved successfully
TTR only applies when severity is set
Incorrect TTR Calculations
Settings Not Saving
Modified at 2026-03-18 20:08:40
Previous
Assign And Collaborate On Vulnerabilities
Next
Control Panel
Built with