SecurityCenter Report Templates

Executive Age Summary Report

by Cody Dumont
October 24, 2013

Executive Age Summary Report
Using a series of charts, tables, and graphs, this overview report provides a summary for an executive to gain a high level understanding of the vulnerability management status of the network environment. This report contains valuable information, including Top 10 Summaries of Assets, Networks and Systems that are vulnerable, as well as useful trend information on vulnerabilities and how long they have existed within the network environment.

Linux/Unix Software Summary

by Josef Weiss
September 24, 2013

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the appropriate command (rpm -qa on RPM-based Linux distributions, qpkg, dpkg, etc.). This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP Address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Windows Software Summary

by Josef Weiss
September 20, 2013

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate installed software on selected hosts.

This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Linux/Unix Remediation Report

by Josef Weiss
September 18, 2013

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.

Windows Remediation Report

by Josef Weiss
September 16, 2013

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more Microsoft patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.

Event Indicator Alert Report

by Cody Dumont
August 1, 2013

Event Indicator Alert Report Screen Shot
This report provides the event summaries of each system that has been identified to have more than one "indicator" event type. The indicator event is a correlation of specific events associated with scanning, compromises, anomalies and other behaviors indicative of determined attackers, advanced malware and other forms of activities worth investigating.

Pages