Patch Deployment

PCI Configuration Report

by Josef Weiss
April 1, 2014

This report template leverages Nessus PCI system configuration results to track which PCI DSS requirements are compliant or non-compliant.

If you need to track which PCI requirements your group is compliant with and you are performing credentialed Nessus configuration audits of your systems, then this SecurityCenter report template can be used to track which requirements are currently being met or not.

Unsupported OS Report

by Josef Weiss
December 19, 2013

This report displays details on any unsupported operating systems that have been found in your environment via Nessus scanning. It utilizes user customizable Dynamic Asset Lists that must be enabled and configured by the analyst prior to running this report.

Executive Patch Mitigation Report

by Cody Dumont
October 30, 2013

Executive Patch Mitigation Report Screen Shot
The report provides an executive summary of the risk mitigation efforts related to patch management. The report provides an analysis of the "Time to Mitigate" and "Time Since Mitigation".

Linux/Unix Software Summary

by Josef Weiss
September 24, 2013

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the appropriate command (rpm -qa on RPM-based Linux distributions, qpkg, dpkg, etc.). This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP Address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Windows Software Summary

by Josef Weiss
September 20, 2013

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate installed software on selected hosts.

This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Linux/Unix Remediation Report

by Josef Weiss
September 18, 2013

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.

Windows Remediation Report

by Josef Weiss
September 16, 2013

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more Microsoft patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.

Outstanding Remediations Tracking

by Ron Gula
May 22, 2013

This report template tracks the number of unique remediations required to keep systems fully patched over time. It leverages color coding to indicates systems missing one, two, three or more remediations. It also highlights systems with one or more missing Microsoft patches.

Consolidation Report for Missing Patches

by Cody Dumont
May 8, 2013

Missing Patch report Detail
This report uses the new Nessus “Patch Report” plugin (ID #66334) and will provide a consolidated missing patch report for each host within the network. The report uses the iterator grouping element to loop through each host of the network and provide a detailed missing patch report for each system identified by the plugin.

CIS SUSE Summary

by Dave Breslin
April 9, 2013

This report template provides a compliance summary for Center for Internet Security (CIS) SUSE Linux Enterprise Server (SLES) Security Configuration Benchmark audits.

The template with very few or no modifications at all can be used with all of Tenable's CIS certified SUSE audits. However, its recommended that audit results generated by configuration check files downloaded from the Tenable Customer Support Portal are kept separate in their own SecurityCenter repositories.

Pages