Configuration & Patch Auditing

Remediation Instructions Report by Severity

by Cody Dumont
November 12, 2013

 Remediation Instructions Report by Severity Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. The report is organized by the plugin type (Active, Passive, and Compliance) and the severity level (Critical, High, and Medium). This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Remediation Instructions Report by Vulnerability

by Cody Dumont
November 7, 2013

Remediation Instructions Report by Vulnerability Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Executive Patch Mitigation Report

by Cody Dumont
October 30, 2013

Executive Patch Mitigation Report Screen Shot
The report provides an executive summary of the risk mitigation efforts related to patch management. The report provides an analysis of the "Time to Mitigate" and "Time Since Mitigation".

Linux/Unix Software Summary

by Josef Weiss
September 24, 2013

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the appropriate command (rpm -qa on RPM-based Linux distributions, qpkg, dpkg, etc.). This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP Address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Windows Software Summary

by Josef Weiss
September 20, 2013

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate installed software on selected hosts.

This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Vulnerabilities Over 30 Days Report

by Cody Dumont
June 20, 2013

Vulnerabilities Over 30 Days Report Screen Shot
This report provides a detailed view of the long-term vulnerability status, by reporting on vulnerabilities older than 30 days. Using SecurityCenter’s advanced cross-referencing functionality, the dashboard also provides a correlation between date the vulnerability was published, the patch release date, and the exploitability of the vulnerability.

IT-Grundschutz BSI-100-2 Report Template

by Josef Weiss
June 19, 2013

Required - IT-Grundschutz BSI-100-2 audit file, Nessus, and SecurityCenter 4.6 or higher

The IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in achieving an appropriate security level for information throughout an organization. The Federal Office for Information Security (BSI) in Germany develops and maintains the BSI Standards, of which IT-Grundschutz is a part, with the providing methods, processes, procedures, and approaches to information security management, risk analysis, and business continuity management.

Microsoft Windows Wireless Network History

by Cody Dumont
May 9, 2013

 Microsoft Windows Network History Screen Shot
Using the Nessus plugin 66350 "Microsoft Windows Wireless Network History", this report tracks the networks a Windows computer has connected too. This reporting is possible via the Network Location Awareness (NLA) registry entries. NLA collects the network information available to the computer and generates a globally unique identifier (GUID) to identify each network.

Pages