Skip to main content
This guide applies to Mac computers

About Vulnerability Response

Vulnerability Response enables you to automate the handling of security vulnerabilities (CVEs) for macOS apps that exist in the Auto App catalog. You can set up rules that tell Iru Endpoint how to respond based on the severity of each CVE; when Iru Endpoint identifies an app with a known vulnerability, it can automatically update that app according to the rules you’ve put in place. This helps keep your apps secure without requiring an administrator to manually intervene each time a vulnerability is discovered.

How It Works

Vulnerability Response scans and remediates all installed applications with a matching bundle ID in the Auto App catalog, even if the Auto App Library Item is not currently in your Library or assigned to a Blueprint. If an app is affected by multiple vulnerabilities with different severities, Vulnerability Response will perform the selected remediation action only for the highest applicable severity. On each Kandji Agent check-in, Vulnerability Response compares the applications installed on your Mac fleet against existing CVEs in the NVD. If a match is found between a CVE and an installed app, Vulnerability Response will flag that match and perform the selected Remediation Action against the app to mitigate the vulnerability, if a matching bundle ID is found in the Auto App catalog. Once you’ve configured the Vulnerability Response Library Item, it automatically begins monitoring your devices for known vulnerabilities. The system continuously scans your Mac fleet and compares installed applications against the CVE database. When vulnerabilities are detected, the system applies your configured remediation rules based on severity levels, ensuring your applications stay secure with minimal administrative intervention. Vulnerabilities in apps not supported as Auto Apps must be updated directly by the app developer. Requests for additional Auto App support can be submitted through the Iru Endpoint Web App using the Feature Requests button.

Remediating Vulnerabilities

Available Remediation Actions

Vulnerability Response supports several remediation actions you can choose from when deciding how to handle security vulnerabilities in Auto Apps: Enforce update upon detection
When a vulnerability is found, Iru Endpoint immediately updates the affected app to the latest version.
Enforce update on a timeframe
When you choose a timeframe, Iru Endpoint will update the app based on the selected enforcement timeframe.
No Action
If a vulnerability at this severity level is found, Iru Endpoint won’t take any action.
The Kandji Agent respects the user’s local time zone for update enforcement.

Viewing Remediated CVEs

When all affected software and devices associated with a CVE are patched, the CVE is assigned a Remediated status.
1

Navigate to Vulnerability Management

Navigate to the Vulnerability Management tab.
2

Filter for Remediated CVEs

Use the Status filter and select Remediated.
The Remediated status includes any CVE where all detections related to that CVE are no longer present on any monitored device. Use the Remediation Status data card to view the overall percentage of CVEs that have been fully remediated in your environment.

CVE Detail View

Selecting a specific CVE opens its detail view, where you can monitor progress and review device status related to that vulnerability. Within the detail view, you’ll see the percentage of devices remediated out of the total detections for the selected CVE. Hovering over this percentage reveals the exact device counts for both remediated (no longer vulnerable) and active (still vulnerable) devices. If the CVE has achieved a Remediated status, the Timeline tab is available by default, allowing you to track the history and remediation events associated with the CVE.

Setting Up the Vulnerability Response Library Item

To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.
1

Name the Library Item

Give the Vulnerability Response Library Item a name.
2

Assign to Blueprints

Select the Blueprint(s) you want to assign this Library Item to.
3

Configure Remediation Actions

Select the Remediation action for each CVE severity level.
4

Exclude Applications (Optional)

Click Add application in order to exclude an application from the auto-remediation rules. You can select apps you wish not to be auto-remediated from the library. If a vulnerability is detected on an application you have excluded, Vulnerability Response will take no action.
5

Save Configuration

Click Save.

User Experience with Vulnerability Response

Updates are delivered silently to the end user, following the same workflow as Auto Apps. When an enforcement deadline is reached and the affected app is open, users will see a prompt with a 5-minute countdown to close the application and save work. If the app isn’t closed, it will be forcibly closed and updated. After updating, the app will reopen.

Considerations

App Support Requirements
  • Only app-based vulnerabilities are remediated, and only when Iru Endpoint provides a supported Auto App for the application
  • Vulnerability Response can update supported apps even if you aren’t also using the Auto App Library Item for that app
Deployment and Configuration
  • Deployment occurs via the Kandji Agent, which is pre-installed on all enrolled Mac computers
  • No additional installation or configuration is needed; simply assign the Vulnerability Response Library Item to your Blueprints
App Blocking vs. Updates
  • Vulnerability Response updates vulnerable apps; it doesn’t block them at launch
  • The App Blocking Library Item can be used to block apps if required
Policy Interactions
  • If both an Auto App and a Vulnerability Response Library Item are targeting the same application, Vulnerability Response will update the app if the vulnerability is detected before the Auto App enforcement deadline
  • If a Mac is assigned both Vulnerability Response and Auto App Library Items with different enforcement deadlines for the same app, the earliest enforcement deadline will apply
  • Multiple Vulnerability Response Library Items can be configured within a Blueprint for different groups, but only one may be assigned per device
  • If a device qualifies for more than one, the last (furthest right in the Assignment Map) is applied
Status Changes
  • If a CVE previously marked as “Risk Accepted” is patched, its status will change to “Remediated”
  • If the vulnerability is detected again and the policy isn’t updated, its status will revert to “Risk Accepted”
Please see our Vulnerability Management Overview article for more information about vulnerabilities.