Assessment Report Descriptions - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 12: Interpreting Scan Results

Assessment Report Descriptions

Introduction
Available
assessment
reports
180
This topic provides a brief description of each assessment report.
The Assessment reports that appear on the Report tab are as follows:
Report
Asset Assessment Detail
Asset Assessment Summary
Operating System Summary
Operating System Summary
by Asset
Service Summary
Service Summary by Asset
Top Vulnerabilities
Vulnerability by Asset
Vulnerability by Group
Vulnerability by OS
Vulnerability Counts
Vulnerability Counts by Asset
Vulnerability Detail by Asset
Vulnerability Differential
Vulnerability Names by Asset
Vulnerability Remedies by
Asset
Vulnerability Summary by
Asset
Vulnerable Assets
Table 65: Assessment report descriptions
Description
A detailed list of vulnerabilities and services for each asset,
including vulnerability remedies and references.
A list of discovered assets, and for each asset, its network
services and vulnerabilities.
Percentage and number of assets by operating system discovered
during an automated network scan.
A list of assets scanned, and for each asset, its operating systems.
A list of services discovered.
A list of services discovered for each asset scanned.
A list of the top vulnerabilities, by frequency, for a specified group
and time.
A lists of the top assets by number of vulnerabilities for a specified
group and time.
A comparison of vulnerabilities across subgroups of a selected
group.
A comparison of vulnerability counts by Operating Systems.
A list detected of vulnerabilities by total number and by
percentage.
Number of vulnerabilities discovered for each asset by severity.
A detailed list of all vulnerability information available for each
asset.
A summary comparison of vulnerabilities and details for each
asset.
A list of vulnerability names for each asset.
A list of vulnerabilities their remedies for each asset.
A list of vulnerabilities and their descriptions for each asset.
A lists of assets by criticality for each vulnerability.
IBM Internet Security Systems

Advertisement

Table of Contents
loading

Table of Contents