Overview
You can add three types of Cork security data to the Planner:Compliance Events
Convert compliance findings into remediation tasks
Vulnerabilities
Create work items for vulnerability patching
Endpoints
Plan security work for specific devices
Adding Items to Planner
Select the Tab
Choose the appropriate tab:
- Compliance for compliance events
- Vulnerabilities for software vulnerabilities
- Endpoints for device-related work
Select Items
Click the checkbox next to each item you want to add. You can select multiple items to create a single planner item that tracks all of them.
Review and Customize
The planner item dialog opens with pre-filled information:
- Title - Auto-generated based on selected items
- Description - Summary of what needs to be addressed
- Business Value - Automatically set based on severity
- Private Notes - Detailed information about each selected item
What Gets Synced to Planner
When you add Cork items to the Planner, the following information is automatically included:Compliance Events
| Field | Planner Mapping |
|---|---|
| Event Type | Included in title and private notes |
| Entity Name | Added to private notes |
| At Risk Status | Sets business value to “High” if at risk |
| Resolved Status | Noted in private notes |
| Created Date | Added to private notes |
Vulnerabilities
| Field | Planner Mapping |
|---|---|
| CVE ID | Used as title for single items |
| Software Product | Included in description and notes |
| Software Vendor | Added to private notes |
| CVSS Score | Added to private notes |
| Priority | Critical/Accelerated sets “High” business value |
| Known Exploited | Highlighted in private notes |
Endpoints
| Field | Planner Mapping |
|---|---|
| Device Name | Used as title for single items |
| Hostname | Added to private notes |
| Operating System | Included in private notes |
| IP Addresses | Listed in private notes |
| Last Seen Date | Added to private notes |
Automatic Business Value Assignment
The Planner automatically sets the Business Value based on the severity of selected items:| Condition | Business Value |
|---|---|
| Vulnerabilities with Critical or Accelerated priority | High |
| Compliance events marked as At Risk | High |
| All other items | Medium |
Single vs. Multiple Items
Single Item Selection
When you select a single item, the planner entry is tailored to that specific finding:- Title: The specific CVE ID, event type, or device name
- Description: Focused description of that single item
- Notes: Detailed information about the specific item
Multiple Item Selection
When you select multiple items, they’re grouped into a single planner item:- Title: “Cork [Type] (N items)” format (e.g., “Cork Vulnerabilities (5 items)”)
- Description: Summary stating how many items are included
- Private Notes: Each item is listed separately with a divider
All selected items must be for the same company. If you need to create planner items for multiple companies, select items from one company at a time.
Viewing Linked Cork Items
After creating a planner item with Cork data, you can view the linked security items:Best Practices
Grouping Related Items
Consider grouping related items together:- Same software vulnerabilities - Group CVEs for the same software product
- Same device issues - Group compliance events affecting the same endpoint
- Same remediation action - Items that can be fixed with a single action
Using Private Notes
Private notes contain the technical details from Cork and are not visible to clients. Use the Public Notes field if you need to share information with stakeholders.Prioritization
Focus on items that should be prioritized:- Known Exploited Vulnerabilities - Active threats requiring immediate action
- Critical Priority - High CVSS scores or severe compliance gaps
- At Risk Compliance Events - Items flagged as requiring attention
Workflow Example
Here’s a typical workflow for managing security remediation:Review Vulnerabilities
Go to Cork > Vulnerabilities and filter for Known Exploited or Critical priority.
Select and Plan
Select the high-priority vulnerabilities for a specific company and click Add to Planner.
Customize the Item
Set an appropriate due date, estimate hours for remediation, and add any additional context.
Track Progress
Use the Planner to track remediation progress, update status, and mark items complete when patched.
Related Resources
Security Module
Overview of the Security module
Planner
Managing planner items
Cork Integration
Setting up Cork integration
Reporting
Creating client reports