Vulnerability remediation is a cornerstone of network security plans. Failure to apply patches or adjust security settings in order to remediate vulnerabilities leaves the network unsecured against many threats. Identifying vulnerabilities and patches that have not been addressed is essential to an effective remediation plan. By leveraging the capabilities of Tenable.sc, Nessus, and the Nessus Network Monitor (NNM), security teams can more easily track vulnerabilities that go unaddressed for over 30 days.
The Vulnerabilities Over 30 Days report provides detailed information about the vulnerability status of an organization’s network so that remediation efforts can be adjusted as necessary. The report filters based on severity, CVSS score and vulnerability type, as well as when the vulnerability or patch was published. Detailed information about the vulnerabilities identified and the hosts affected is included. This report can be used to understand the effectiveness of remediation efforts so that adjustments can be made as needed.
The chapters in this report provide several distinct views of the vulnerability status of the network. Trend data about vulnerabilities published over 30 days ago is tracked by severity. Extensive information is included about vulnerabilities with patches published over 30 days ago by severity, CVSS score, and plugin type. Additionally, details about the most common exploitable vulnerabilities and the most severe vulnerabilities with patches available are included. Security teams can use the information in these chapters to gain a deep understanding into the vulnerabilities that could impact their network and the remediation measures necessary.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Feed under the category Threat Detection & Vulnerability Assessments. The report requirements are:
- Tenable.sc 4.8.2
- Nessus 8.10.1
- NNM 5.11.0
Tenable's Tenable.sc Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Nessus is continuously updated with information about advanced threats, zero-day vulnerabilities, and new types of regulatory compliance configuration audits. The Nessus Network Monitor (NNM) performs deep packet inspection to enable discovery and assessment of operating systems, network devices, hypervisors, databases, tablets, phones, web servers, cloud applications, and critical infrastructure. By integrating with Nessus and NNM, Tenable.sc CV’s continuous network monitoring is able to detect threats and vulnerabilities across the enterprise.
This report contains the following chapters:
- Executive Summary: This chapter provides an overview of the vulnerability status of the network based on the vulnerabilities and patches published over 30 days ago and can be used to determine the effectiveness of remediation and patching efforts.
- Trend Analysis of Vulnerabilities Published Over 30 Days Ago: The Trend of Vulnerabilities Published 30 Days Ago line chart illustrates the counts of vulnerabilities that were published more than 30 days ago by severity.
- Severity Levels of Vulnerabilities with Patches Over 30 Days: This chapter uses tables to provide detailed information about vulnerabilities with patches published more than 30 days ago and the hosts affected by severity and vulnerability type.
- CVSS Scores of Vulnerabilities with Patches Over 30 Days: This chapter uses tables to provide detailed information about vulnerabilities with patches published more than 30 days ago and the hosts affected by CVSS score and vulnerability type.
- Top Exploitable Vulnerabilities Published Over 30 Days Ago: This chapter contains information about the exploitable vulnerabilities published over 30 days ago.
- Vulnerabilities with Patches Published Over 30 Days Ago: This chapter contains information about the most severe vulnerabilities with patches published over 30 days ago.