SecurityCenter Report Templates

Nessus Scan Report

by Josef Weiss
February 4, 2014

For customers who use Nessus for vulnerability scanning and then move to SecurityCenter, vulnerability reporting may be somewhat challenging. This report mimics the look and feel of a typical Nessus scanner vulnerability report.

Like a Nessus scanner report, this report contains a Table of Contents, iterates host information, and provides a results summary and vulnerability details for all hosts scanned.

CIP-002 Identification of Critical Cyber Assets Report

by Cody Dumont
January 23, 2014

CIP-002 Identification of Critical Cyber Assets Screen Shot
For organizations that are required to be NERC compliant, SecurityCenter can lead the way to compliance. The first focus area is the “Identification of Critical Cyber Assets”. SecurityCenter uses Log Correlation Engine (LCE), Passive Vulnerability Scanner (PVS), and Nessus to identify the assets. When using the complete Tenable family of products, an organization can easily identify all critical assets and all associated assets.

Errors and Warnings Report

by Josef Weiss
January 21, 2014

This report displays details on all warnings and errors identified in the environment.

The report has two main customizable sections.

The error section contains tables that present the reviewer with all errors found. By default, it is set up for display of the top 10 errors by count, and/or the last 24 hours by time. This can be easily modified to extend timeframe or display parameters. This section presents detected errors using five different methods.

Monthly Executive Report

by Cody Dumont
January 7, 2014

Monthly Executive Report
This report is produced by Tenable SecurityCenter and provides a high-level executive review of vulnerability detection over the past 30 days. This report provides executive-level directors and managers with a detailed understanding of the vulnerability risk management program via a series of trend graphs, charts, tables, and other reporting components. A CISO can use this report in monthly meetings to communicate the status of current risk levels to other members of the organization.

Exploitable by Malware

by Cody Dumont
December 26, 2013

Exploitable by Malware Screen Shot
This report provides a detailed view into the exploitability of your network. The following chapters show which vulnerabilities are exploitable by malware, and then compares the exploitability to attack frameworks.

Unsupported OS Report

by Josef Weiss
December 19, 2013

This report displays details on any unsupported operating systems that have been found in your environment via Nessus scanning. It utilizes user customizable Dynamic Asset Lists that must be enabled and configured by the analyst prior to running this report.

Pages