Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Unsupported Product Summary

by Josef Weiss
September 18, 2014

The proliferation of unsupported and end-of-life products is an issue for many organizations and increases the effort required to minimize risk. As applications and operating systems reach their end-of-life (EOL), vendors stop offering support. Therefore, security and stability decrease, raising concern as time progresses. Patches, updates and security fixes will no longer be available, so identifying systems running EOL applications is an important part of assessing and minimizing organizational risk.

This dashboard collection is comprised of seven components that report on unsupported (end-of-life) products found in the environment. Components include indicators, bar graphs, pie-charts and tables to display, track and report on unsupported operating systems and applications.

Vulnerability data is filtered using a variety of plugins, such as Nessus plugin 33850, Unsupported Unix Operating System. By searching the vulnerability text for keywords, plugin family, severity, and OS CPE strings, SecurityCenter Continuous View (CV) can better present the data to the security analyst. Using these examples, the analyst can copy the components and create new components specific to the organization’s needs.

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. SecurityCenter CV allows for the most comprehensive and integrated view of network health. Nessus is the global standard in detecting and assessing network data.

The dashboard and its components are available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments.

The dashboard requirements are:

  • SecurityCenter 4.8.1
  • Nessus 5.2.7

Components include:

  • Unsupported Operating Systems - This indicator matrix reports on operating systems that are no longer supported. The matrix displays popular operating systems, but is easily modified to fit organizational requirements. Plugin ID #33850, with vulnerability text filters that filter for the appropriate operating system name in the plugin output, alert on Unix-based operating systems that are no longer supported. Vulnerability text, along with a CPE string for Microsoft, is used to alert on end-of-life Microsoft operating systems by turning the indicator purple when an alert is present.
  • Unsupported Applications by Type and Percentage - This bar chart component produces a graph on the percentage of unsupported applications and operating systems in the environment sorted product type, such as database servers, web servers, operating systems, or applications. In this component, a base query with a vulnerability text filter is utilized with the key word of ‘unsupported’, along with additional filters for the plugin family. This allows a chart to be displayed that presents the percentage of unsupported or end-of-life applications by type, and categorized by either operating system or application.
  • Unsupported Applications - This table displays all unsupported applications by name, sorted by severity. Displayed is the plugin ID, application name, plugin family, severity, and the total found. This component identifies unsupported applications by the ‘unsupported’ vulnerability text. The table also filters on severity, dropping any informational results, and presents them via the Vulnerability Summary tool.
  • Unsupported Adobe Applications - This table displays all unsupported Adobe applications by name, sorted by severity. Displayed is the name of the unsupported application, plugin family, severity, and the total found. This component identifies unsupported applications by the ‘unsupported’ vulnerability text, with a CPE string of ‘adobe’ to limit results to Adobe applications. The table also filters on severity, dropping any informational results, and presents them via the Vulnerability Summary tool.
  • Unsupported Software by Severity - This pie chart presents a graphical representation based on severity, unsupported applications and operating systems found in the environment.
  • Unsupported *nix OS - This table displays all unsupported Unix-based operating systems. Displayed are the IP address, NetBIOS identifier, DNS name, MAC address, and repository of the offending device. This component identifies unsupported *nix operating systems by the Nessus plugin 33850 (Unix OS No Longer Supported) operating systems via the IP Summary tool.
  • Unsupported Microsoft OS - This table displays all unsupported Microsoft operating systems. Displayed are the IP address, NetBIOS identifier, DNS name, MAC address, and repository of the offending device. This component identifies unsupported Microsoft operating systems by the ‘unsupported’ vulnerability text and the base CPE string to identify Microsoft operating systems via the IP Summary tool.