SecurityCenter Report Templates

IT-Grundschutz BSI-100-2 Report Template

by Josef Weiss
June 19, 2013

Required - IT-Grundschutz BSI-100-2 audit file, Nessus, and SecurityCenter 4.6 or higher

The IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in achieving an appropriate security level for information throughout an organization. The Federal Office for Information Security (BSI) in Germany develops and maintains the BSI Standards, of which IT-Grundschutz is a part, with the providing methods, processes, procedures, and approaches to information security management, risk analysis, and business continuity management.

PCI DSS Indicators Report

by Cody Dumont
June 19, 2013

PCI DSS Indicator Report Screen Shot
The PCI Indicator report provides the information found when using the "PCI DSS Indicators Dashboard". The report is comprised of five chapters, with individual sections containing descriptive paragraphs and tables to summarize the vulnerabilities and the affected hosts.

HP Software Vulnerabilities

by Cody Dumont
June 18, 2013

HP Software Vulnerabilities Report Screen Shot
This report enumerates known software and hardware manufactured by HP, such as HP System Management, HP OpenView, and HP Data Protector. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

IBM Software Vulnerabilities

by Cody Dumont
June 17, 2013

IBM Software Vulnerabilities Report Screen Shot
This report enumerates known hardware and software manufactured by IBM, such as DB2, IBM Lotus Domino, and IBM InfoSphere. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

Oracle Software Vulnerabilities

by Cody Dumont
June 14, 2013

Oracle Software Vulnerabilities Report Screen Shot
This report enumerates known software and hardware manufactured by Oracle, such as Sun Servers, Java, database, and web technologies. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

EMC Software Vulnerabilities

by Cody Dumont
June 13, 2013

EMC Software Vulnerabilities Report Screen Shot
This report enumerates known software and hardware manufactured by EMC2, such as EMC2 NetWorker Module, VMware ESXi, and RSA Authentication Client. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

Enterprise Application Vulnerability Report

by Josef Weiss
June 12, 2013

This report enumerates known Enterprise Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

SecurityCenter (via PVS, LCE, and Nessus) collects information about installed products, identifies those products using standardized industry methods, and presents that information via this report.

Cisco Software Vulnerabilities

by Cody Dumont
June 12, 2013

Cisco Software Vulnerabilities Report Screen Shot
This report enumerates known software & hardware manufactured by Cisco Systems, such as router IOS, VPN client and collaboration suites. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

Desktop Application Vulnerability Report

by Josef Weiss
June 11, 2013

This report enumerates known Desktop Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for enforcing and verifying IT management policies relating to assets, such as vulnerability, configuration and remediation policies.

SecurityCenter (via PVS, LCE, and Nessus) collects information about installed products, identifies those products using standardized industry methods, and presents that information via this report.

Pages