Vulnerability Reporting

Vulnerability Reporting by Common Ports

by Cody Dumont
July 22, 2014

Vulnerability Reporting by Common Ports Screen Shot
There are several methods of detecting port usage within a network. This report leverages a variety of active and passive port filters to display vulnerability information in multiple ways.

Tracking Microsoft Security Bulletins Detailed Reports

by Cody Dumont
July 17, 2014

Tracking Microsoft Security Bulletins Detailed Reports ScreenShot
One of the most difficult tasks in information security is patch management. SecurityCenter customers have an advantage over other IT professionals; this report can help IT professionals understand the true state of Microsoft patch management.

Event Analysis Report

by Josef Weiss
July 15, 2014

This report contains information that provides an overview of collected events. This provides the analyst with many different methods to quickly locate actionable context in your data. Its counterpart is the Event Analysis Dashboard.

Incident Response Report

by Josef Weiss
July 3, 2014

This report displays incident response details on Systems that have been found in your environment to have active intrusion events. Intrusion events are events that are triggered by plugin 800125 - Long Term Intrusion Activity, or 800017 - Intrusion Statistics..

Qualitative Risk Analysis with CVSS Scores

by Michael Willison
June 20, 2014

Qualitative Risk Analysis with CVSS Scores Screen Shot
Information Security professionals continuously perform various types of risk assessments within their environment. SecurityCenter users have a secret weapon in the battle to properly assess risk, and that weapon is SecurityCenter's native ability to fully use the CVSS scoring system.

FireEye Status Report

by Josef Weiss
June 12, 2014

This Report and all associated components require the following:

  • Nessus audit file, and successful post scan audit file results. [TNS_BestPractice_FireEye.audit]
  • FireEye Dynamic Asset. [FireEye Appliances]

This report leverages the Tenable FireEye Best Practices Audit, and Dynamic Asset to provide security settings and other useful information on FireEye device configuration to an administrator.

Requirements are:

CVE Iterator Report

by Josef Weiss
June 3, 2014

This report displays CVE vulnerability information. The first section of the report provides graphical CVE summary results in 5 year blocks by severity. It is followed by a CVE Trend over the last 90 days, a mitigated CVE total bar chart, and a pie chart of existing CVE severity vulnerabilities for the last 5 years.

Chapter two displays a table of all CVE Vulnerabilities by CVE ID, the severity, and number of hosts/totals that contain the vulnerability.

Three charts are presented:

Internet Explorer Zero Day Report

by Josef Weiss
May 6, 2014

Internet Explorer Zero Day Report Screen Shot
The latest zero-day Internet Explorer vulnerability leaves organizations open to new attacks using remote execution exploits. How vulnerable is your organization? With this report, SecurityCenter customers can better analyze risk and create remediation strategies.

Admin Discovery Report

by Josef Weiss
April 29, 2014

This report displays details on Administrator accounts that have been found in your environment via LCE and active Nessus scanning.

Provided are details on:

  • Administrative accounts that have been identified within the environment.
  • Accounts that are listed as being 'admin', 'administrator', or 'root' are displayed, along with any other accounts provisioned on the system.

This can be easily configured to your own environment if required by altering the filter for vulnerability text.

FortiGate Scan Report

by Josef Weiss
April 22, 2014

This report leverages the Tenable FortiGate Best Practices Audit and other plugins to provide security settings and other useful information on FortiGate device configuration to an administrator.

Requirements:

  • root/admin SSH credentials for FortiGate FortiOS device.
  • Plugin ID #70272 (Fortigate FortiOS compliance checks)
  • Audit File for Fortigate (TNS_Fortigate_Best_Practices.audit)
  • FortiOS Dynamic Asset

Security settings included in this audit:

Pages