SecurityCenter Report Templates

Remediation Instructions Report by Severity

by Cody Dumont
November 12, 2013

 Remediation Instructions Report by Severity Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. The report is organized by the plugin type (Active, Passive, and Compliance) and the severity level (Critical, High, and Medium). This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Remediation Instructions Report by Vulnerability

by Cody Dumont
November 7, 2013

Remediation Instructions Report by Vulnerability Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Executive Age Summary Report

by Cody Dumont
October 24, 2013

Executive Age Summary Report
Using a series of charts, tables, and graphs, this overview report provides a summary for an executive to gain a high level understanding of the vulnerability management status of the network environment. This report contains valuable information, including Top 10 Summaries of Assets, Networks and Systems that are vulnerable, as well as useful trend information on vulnerabilities and how long they have existed within the network environment.

Linux/Unix Software Summary

by Josef Weiss
September 24, 2013

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the appropriate command (rpm -qa on RPM-based Linux distributions, qpkg, dpkg, etc.). This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP Address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Windows Software Summary

by Josef Weiss
September 20, 2013

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate installed software on selected hosts.

This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Linux/Unix Remediation Report

by Josef Weiss
September 18, 2013

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.

Pages