Ideally, updates and security patches should be deployed as soon as they become available, to prevent exploitable vulnerabilities. Reality is, that is a somewhat difficult task, and rarely do patches get deployed as fast as they should.
This dashboard assists organizations by implementing controls to quickly identify, and reduce the potential exploitation of application vulnerabilities.
For a link to the Discussion Forum topic on the SANS Top 20, click here.
Updated May 1, 2013
This dashboard displays many of the SANS Top 20 Critical Controls.
• Security Center 4.6 or higher is required
• Required Tools – LCE, PVS, Nessus Scanner
This chart displays audits for a variety of Windows password and account settings that are performed by Nessus.
This dashboard is designed to display the overall compliance status of Tenable's certified Center for Internet Security (CIS) Linux and UNIX Configuration Benchmark audits. The dashboard with several minor modifications can be used with all of Tenable's CIS certified Linux and UNIX audits. When using multiple CIS audits ensure the results are separated by repositories. After importing the dashboard ensure it's five components are modified to filter by the appropriate repository. The matrix cells displaying percentage bars can be edited simultaneously.
This dashboard identifies vulnerabilities which can be exploited by Metasploit, Core Impact or Immunity CANVAS.
This dashboard provides a summary of Windows hosts that have active wireless network connections.
Nessus plugin ID 25197 results are used to populate the dashboard components. The plugin reports the SSID and network card being used for an active wireless network connection. Plugin 25197 is a Nessus credentialed check. It does not require an agent to be deployed on Windows hosts to execute successfully.