Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Malicious Code Prevention Report

by Ryan Seguin
October 20, 2017

The Cyber Exposure gap is often widened by the amount of time invested in identifying risk. Security personnel spend disproportionate time evaluating assessed threats in comparison to the hours spent mitigating that threat. This report serves to reduce effort, and assist in narrowing the gap between risk and mitigation.

As the elastic attack surface expands and contracts, asset malware protection changes too. This report’s strategic focus is to add context to asset exposure to prioritize remediation, and to select appropriate remediation techniques. These strategies are achieved through malware identification and prevention.

Analysts and administrators will be able to use this report to quickly assess their business’ current malware state. With easy to understand data points, any organization will be able to maximize the understanding of their digital landscape’s health. With that understanding, direct action can be taken and a leap forward can be made to ensure that the Cyber Exposure gap is reduced. 

Cyber Exposure will help analysts drive a new level of dialogue with the business. By knowing which areas of the business are secure or exposed, analysts can effectively measure the organization's Cyber Risk. Analysts can use the metrics provided by Tenable.io to determine how much and where to invest to reduce risk to an acceptable amount and help drive strategic business decisions. Tenable.io is the first Cyber Exposure solution and provides key risk metrics that organizations need to measure risk exposure. 

Executive Summary

This chapter presents a high-level overview of potential malware on the network and the malware protection status of the network. Vulnerabilities are listed here by plugin ID for quick asset association and assessment. The summary serves to give a top level health check and asset status.

Hosts Infected with Malware

This chapter makes use of many different methods to identify potentially compromised hosts. Immediate action items should be made to address assets presented in this chapter. Assets found in this chapter are likely an active threat to an organization.

Hosts with Vulnerabilities that Can Be Exploited

This chapter presents information on exploitable vulnerabilities, which will help direct protection efforts. While these vulnerabilities do not indicate the presence of malware, these vulnerabilities should be acted upon to prevent malware injection. Creating tasks to remediate vulnerabilities found on these assets strengthens an organization’s ability to protect assets from future attack.

Malware Protection

This element detects whether antivirus software is installed and running on an asset and whether the antivirus engine and virus definitions are up to date. Assets should always be as up to date as possible so that antivirus solutions can perform correctly. For an organization that has an active antivirus update plan, this chapter will also assist with identifying potential weaknesses in current update operations.

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.