Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Network Mapping Report

by David Schwalenberg
October 1, 2014

Network Mapping Report Screenshot

Computer networks do not remain static. An organization that does not understand their network, what devices are on the network, the network connections, and who is talking to whom, will not be able to effectively manage or protect their network. If the inventory and activity on a network is not monitored, unauthorized devices and connections may go unnoticed. These unauthorized changes, no matter how well-intentioned, may lead to security gaps and vulnerabilities that can expose critical systems to attack and sensitive data to exploitation.    

This report uses all aspects of SecurityCenter Continuous View (CV), including active scanning, passive listening, and host analysis. The information in this report can assist the organization in better understanding the network, tracking inventory, discovering network connections, and even detecting unauthorized systems and unusual activity.

What systems were recently added to the network? Which ports and users are most active on the network? Which hosts have the most internal connections to which other hosts? Which hosts have outbound external connections? This report can help answer these questions and more. Information on recent network changes, lists of systems by type, and network host details will assist the organization in maintaining accurate inventory and detecting rogue devices and unauthorized users. Information on the most active systems, ports, and users will assist in tracking normal activity as well as discovering any unusual activity. Information on which hosts are talking to which other hosts will assist the organization in detecting any unauthorized or suspicious connections.

Note that this report contains many lists of hosts. To keep the report from being overly long, the number of results displayed in these lists is limited. Because of this, a list may display only a portion of all the actual results. If more results are desired, the report can be easily modified. Consider also filtering on assets or subnets to produce a report more focused on particular sections of the network.

This report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the SecurityCenter Feed under the category Discovery & Detection.

The report requirements are:

  • SecurityCenter 4.8.2
  • Nessus 6.9.0
  • LCE 4.8.1
  • PVS 5.1.0
  • Tenable Network Monitor
  • Tenable NetFlow Monitor

See also the related Network Mapping Dashboard.

Tenable SecurityCenter Continuous View (CV) is the market-defining continuous network monitoring solution, and helps organizations to know and manage their networks. Active scanning periodically examines systems to discover system information, vulnerabilities, and compliance concerns. Agent scanning enables detection and scanning of transient devices. Passive listening provides real-time monitoring to collect information about systems and vulnerabilities. Host data and data from other security investments is analyzed to monitor activity and identify new devices and users. SecurityCenter CV provides an organization with the most comprehensive view of the network, and the intelligence needed to manage the network in order to safeguard critical assets and information.

Chapters

    Executive Summary - This report assists an organization in better understanding the network, tracking inventory, discovering network connections, and even detecting unauthorized systems and unusual activity. The executive summary gives a brief overview of the information presented in the report.

    General Network Information - This chapter presents overall information about the network, including the top recommended remediations, recent network changes, the most active systems, ports, and users on the network, breakdowns of network systems, and those hosts on the network interacting with cloud services.

    Details by Host - This chapter presents information for each host detected on the network, including when it was last scanned, who is responsible for it, when it was last detected, its most active ports and users, and whether it had any detected internal and external connections to other IP addresses.

    Internal Host Connectivity - This chapter presents information on the passively detected internal connections between hosts on the network. For each host is displayed the hosts that connected to it, as well as the hosts to which it connected.

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

    Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    100 assets

    Choose Your Subscription Option:

    Buy Now

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

    Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    100 assets

    Choose Your Subscription Option:

    Buy Now

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

    Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

    Tenable Vulnerability Management

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    100 assets

    Choose Your Subscription Option:

    Buy Now

    Try Tenable Web App Scanning

    Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

    Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

    Buy Tenable Web App Scanning

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    5 FQDNs

    $3,578

    Buy Now

    Try Tenable Lumin

    Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

    Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

    Buy Tenable Lumin

    Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

    Try Tenable Nessus Professional Free

    FREE FOR 7 DAYS

    Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

    NEW - Tenable Nessus Expert
    Now Available

    Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

    Fill out the form below to continue with a Nessus Pro Trial.

    Buy Tenable Nessus Professional

    Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

    Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

    Select Your License

    Buy a multi-year license and save.

    Add Support and Training

    Try Tenable Nessus Expert Free

    FREE FOR 7 DAYS

    Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

    Already have Tenable Nessus Professional?
    Upgrade to Nessus Expert free for 7 days.

    Buy Tenable Nessus Expert

    Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

    Select Your License

    Buy a multi-year license and save more.

    Add Support and Training