To gain insights into your environment's Runtime Vulnerability Analytics (RVA) coverage and pinpoint areas of exposure, you can use the ready‑made Vulnerability coverage dashboard.
The dashboard currently addresses library vulnerability coverage in runtime. Support for additional types, such as code‑level vulnerabilities, Kubernetes, and runtime coverage, is planned for upcoming releases.
The Vulnerability coverage dashboard supports your workflows for managing results and prioritizing remediation by providing a clear overview of vulnerability concentration and how coverage evolves over time. It helps you
Highlight monitoring gaps by showing processes not monitored, aggregated to the host level.
Surface the most affected entities to support prioritization.
Track trends in findings and scans over time.

Before using the dashboard, ensure the following prerequisites are met:
You can open the dashboard either from
Vulnerabilities or
Dashboards.
From
Vulnerabilities:
From
Dashboards:
Host coverage is derived from process monitoring. A host is considered covered if at least one of its processes is monitored.
The following explains how host coverage is determined for library vulnerabilities.
To increase host coverage for third‑party vulnerabilities, focus on ensuring that processes are monitored.
Steps to improve coverage:
With the Vulnerability coverage dashboard, you can accomplish various use cases, such as:
Validate monitoring coverage: Ensure critical processes are monitored and reflected at the host level.
Support prioritization: Identify the most affected processes and their corresponding hosts before deciding remediation steps.
Track exposure trends: Monitor how vulnerability findings evolve and whether scans are keeping pace.
Communicate risk: Share high‑level coverage and severity insights with stakeholders.