Asset Data - Novell SENTINEL RAPID DEPLOYMENT 6.1 - 12-2009 User Manual

Table of Contents

Advertisement

Severity, Vulnerability, and AttackId Columns
Figure 13-1
Within an event, the values in the Vulnerability field convey the following:
When the Vulnerability field equals 1, the asset or destination device is possibly exploited.
When the Vulnerability field equals 0, the asset or destination device is not being exploited.
When the Vulnerability field is blank, the exploit detection feature of Sentinel is not enabled.
To view events that indicate a possible exploitation, create an Active View
Vulnerability equals 1. For example, if you have Nmap and have run the Nmap Collector, you can
view asset information on the exploited asset or any asset.
For more information on how exploit detection works and which intrusion detection systems and
vulnerability scanners are supported, see

13.1.3 Asset Data

To view Asset information for any event, right-click an event or events, then select Analysis > Asset
Data.
A window similar to the one below displays:
Asset Report
Figure 13-2
Chapter 2, "Sentinel Control Center," on page
with a filter where
TM
41.
Quick Start 295

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel rapid deployment 6.1

Table of Contents