Chapter 12: Interpreting Scan Results; Setting Up A Summary Page For Vulnerability Management - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 12: Interpreting Scan Results

Setting Up a Summary Page for Vulnerability Management

Introduction
Vulnerability
management
options
168
The Summary view in the SiteProtector Console acts as a portal to different types of
information available in SiteProtector. You can configure the Summary page to
dynamically display information about scanning and vulnerability management.
The following table describes the information portal options related to vulnerability
management:
Portal
Description
Scan Progress
Shows the number of scan jobs currently in progress and provides a link to
the Properties tab for the Site where you can view all command jobs for the
Site.
Ticket Status
Displays the total number of critical, high, medium, and low priority tickets
by status, including the following:
Vulnerability History
Displays a bar graph that illustrates the following information:
by Day
Vulnerability History
Displays a bar graph that illustrates the following information:
by Month
Vulnerability History
Displays a bar graph that illustrates the following information:
by Week
Vulnerability
Lists vulnerabilities for each operating system and provides the following
Summary by OS
information for each operating system:
Table 58: Information portals for vulnerability management
New
Open
In Progress
Closed
Verified closed
Pending System Verification
System Verified Still Vulnerable
System Verified Success
Total number of high priority vulnerabilities by day
Total number of medium priority vulnerabilities by day
Total number of low priority vulnerabilities by day
Total number of all vulnerabilities by day
Total number of high priority vulnerabilities for the month
Total number of medium priority vulnerabilities for the month
Total number of low priority vulnerabilities for the month
Total number of all vulnerabilities for the month
Total number of high priority vulnerabilities by week
Total number of medium priority vulnerabilities by week
Total number of low priority vulnerabilities by week
Total number of all vulnerabilities by week
Total number of high priority vulnerabilities on the operating system
Total number of medium priority vulnerabilities on the operating system
Total number of low priority vulnerabilities on the operating system
Total number of vulnerabilities in all categories on the operating system
IBM Internet Security Systems

Advertisement

Table of Contents
loading

Table of Contents