Vulnerability Reporting

Remote Access Detection

by Michael Willison
July 11, 2014

Remote Access Detection screenshot
This dashboard provides information on remote access vulnerabilities. These include vulnerabilities associated with the standard protocols of SSH, VNC, and RDP, along with the proprietary protocols of pcAnywhere, Apple Remote Desktop, WebEx, Google Desktop, and GoToMyPC.

Tracking Microsoft Security Bulletins Dashboards

by Cody Dumont
July 8, 2014

Tracking Microsoft Security Bulletins Dashboard Screen Shot
One of the most difficult tasks in information security is patch management. SecurityCenter customers have an advantage over other IT professionals; this series of dashboards can help IT professionals understand the true state of Microsoft patch management.

FireEye Status Dashboard

by Josef Weiss
May 29, 2014

This dashboard displays the summary status of a FireEye device and includes indicators based on Nessus' FireEye audit findings.

Using the Nessus audit checks, this dashboard highlights the pass/fail results of the checks, allowing a security analyst to review the configuration and status of the device without requiring device management privileges.

Internet Explorer Vulnerabilities

by Cody Dumont
April 30, 2014

Internet Explorer Vulnerabilities Screenshot
The latest zero-day Internet Explorer vulnerability leaves organizations open to new attacks using remote execution exploits. How vulnerable is your organization? With this dashboard, SecurityCenter customers can better analyze risk and create remediation strategies.

HeartBleed Dashboard

by Cody Dumont
April 10, 2014

HeartBleed Dashboard Screenshot
This dashboard reports on the newly identified HeartBleed vulnerability. Using all the tools available to SecurityCenter users, Tenable has several methods of identifying vulnerable systems.

PCI Status

by Josef Weiss
March 25, 2014

This dashboard leverages Nessus PCI system configuration results to track which PCI controls are compliant or non-compliant. As such, a PCI Audit Policy must be used to achieve results. Audit files are available for download via the Tenable Support Portal for a variety of operating environments.

PVS Trust Relationships

by Josef Weiss
March 11, 2014

This dashboard presents trust relationships between clients and servers that have been passively gathered via PVS plugins 3 and 15. These plugins collect data on internal client trusted client connections and internal server trusted connections. Results are sorted by TCP port and displayed in a series of matrix indicators within the individual components. Viewing plugin output provides insight into devices that are establishing trusted connections to each other.

CVE Analysis

by Josef Weiss
February 18, 2014

This dashboard trends outstanding CVE, and recently mitigated issues in a variety of tables and trend lines. It builds on a previously released dashboard title CVE Trending By Year.

Required Tools - Nessus or PVS

This dashboard leverages SecurityCenter's ability to filter vulnerabilities based on the specific year of the associated CVE ID for it.

There are four components of this dashboard.

PVS Detections

by David Schwalenberg
February 12, 2014

PVS Detections Dashboard Screenshot
This dashboard highlights network vulnerabilities and promotes network awareness by displaying indications of the network traffic detected by the Passive Vulnerability Scanner (PVS).

Pages