Interpreting Vulnerability Descriptions - NetSHIELD Branch PRO User Manual

Network & byod access control
Hide thumbs Also See for Branch PRO:
Table of Contents

Advertisement

I
V
D
NTERPRETING
ULNERABILITY
ESCRIPTIONS
Complete reports (typically read by system administrators and other IT personnel) contain
entries sorted on selections you made earlier under Recreate Report. You can search for
particular CVEs in the PDF report using Acrobat's search feature and standard CVE names.
A typical serious or high risk is fully explained as in the example shown. In addition, the report
provides details on how to respond to the risk and/or a link to more data about that vulnerability
and how to correct it.
You may also encounter CVE candidates (with the CAN prefix). These are still around although
MITRE retired the term "Candidate" in 2005.
Tabular data in Complete reports indicates the number of vulnerabilities on each machine and a
list of the most critically vulnerable hosts, the number of vulnerabilities they have, and their
operating systems. At the end of the report, an Appendix provides more data on compliance
with regulations and credit card merchant programs.
Ten Tara Boulevard, Suite 140
Copyright © 2017 SnoopWall, Inc.
Nashua NH 03062
Page | 115

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents