Quantcast
Channel: Tenable Security Center templates
Viewing all 423 articles
Browse latest View live

Linux/Unix Remediation Report

$
0
0

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also highlights systems missing one or more patches. This not only is much easier for an IT administrator to consume, it provides a measure of how much 'work' is required to secure a network, as well as the amount of risk reduced when certain patch efforts are taken.


Windows Software Summary

$
0
0

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate installed software on selected hosts.

This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

Linux/Unix Software Summary

$
0
0

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the appropriate command (rpm -qa on RPM-based Linux distributions, qpkg, dpkg, etc.). This report is comprised of a Table of Contents for each identified host. The Identified Hosts Table lists the hosts by IP Address, NetBIOS Name, and DNS Name, and is followed by a detailed look at each host individually.

IAVM Executive Summary Report

$
0
0
IAVM Executive Summary Report Screenshot
The US Cyber Command (USCYBERCOM) publishes Information Assurance Vulnerability Management (IAVM) Notices for the DoD. This report provides an executive summary to the current IAVM program.

Mobile Summary Report

$
0
0
This report provides an executive summary of the current Mobile Device Management (MDM) status. The report was created using the new features within SecurityCenter 4.7 and the features within Nessus to collect mobile data from the MDM solution.

Executive Age Summary Report

$
0
0
Executive Age Summary Report
Using a series of charts, tables, and graphs, this overview report provides a summary for an executive to gain a high level understanding of the vulnerability management status of the network environment. This report contains valuable information, including Top 10 Summaries of Assets, Networks and Systems that are vulnerable, as well as useful trend information on vulnerabilities and how long they have existed within the network environment.

Executive Patch Mitigation Report

$
0
0
Executive Patch Mitigation Report Screen Shot
The report provides an executive summary of the risk mitigation efforts related to patch management. The report provides an analysis of the "Time to Mitigate" and "Time Since Mitigation".

Remediation Instructions Report by Vulnerability

$
0
0
Remediation Instructions Report by Vulnerability Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Remediation Instructions Report by Severity

$
0
0
 Remediation Instructions Report by Severity Screen Shot
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. The report is organized by the plugin type (Active, Passive, and Compliance) and the severity level (Critical, High, and Medium). This report also contains steps to mitigate the risk of the vulnerabilities, including CVE, BID, and vendor knowledgebase articles. Additionally, this report indicates if the vulnerability is exploitable and by which exploit platform.

Copyright Report

$
0
0
Copyright Report

This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, your organization might be held liable for copyright infringement by associations such as the RIAA or the MPAA.

The associated component can be found here:Copyright Indicator

Oracle DB Audit Report

$
0
0
Oracle DB Audit Report Screenshot
This report displays the results from an audit check of Oracle database servers.

MS SQL Server Audit Report

$
0
0
MS SQL Server Audit Report Screenshot
This report displays the results from an audit check of Microsoft SQL Server database servers.

Remediation Instructions Report by Host

$
0
0
Remediation Instructions Report by Host Screen Shot
This Remediation Report provides detailed instructions to resolve vulnerabilities on the top 20 most vulnerable systems tracked within SecurityCenter. The report is organized by the plugin type (Active, Passive, and Compliance).

Malware Indicators Report

$
0
0
Malware Indicators Report Screenshot
This executive-level report presents indicators that may reveal the presence of malware on the network and a trend graph of of these detections over the last 72 hours.

Daily Host Alerts Report

$
0
0
Daily Host Alerts Report Screenshot
This report presents systems and users identified by the Daily_Host_Alert LCE event.

Unsupported OS Report

$
0
0

This report displays details on any unsupported operating systems that have been found in your environment via Nessus scanning. It utilizes user customizable Dynamic Asset Lists that must be enabled and configured by the analyst prior to running this report.

Exploitable by Malware

$
0
0
Exploitable by Malware Screen Shot
This report provides a detailed view into the exploitability of your network. The following chapters show which vulnerabilities are exploitable by malware, and then compares the exploitability to attack frameworks.

Monthly Executive Report

$
0
0
Monthly Executive Report
This report is produced by Tenable SecurityCenter and provides a high-level executive review of vulnerability detection over the past 30 days. This report provides executive-level directors and managers with a detailed understanding of the vulnerability risk management program via a series of trend graphs, charts, tables, and other reporting components. A CISO can use this report in monthly meetings to communicate the status of current risk levels to other members of the organization.

Daily Host Alerts Report: Hosts Accessed by Users

$
0
0
Daily Host Alerts Report: Hosts Accessed By Users Screenshot
This report presents a list of all users and the hosts they have accessed, as identified by the Daily_Host_Alert LCE event.

Critical and Exploitable Vulnerabilities Report

$
0
0
Critical and Exploitable Vulnerabilities Report Screen Shot
This report provides a summary of critical severity vulnerabilities. The report has an executive summary chapter showing tables and trend graphs highlighting the status of critical severity vulnerabilities. The two following chapters provide the delta between critical severity vulnerabilities that are exploitable versus not exploitable.
Viewing all 423 articles
Browse latest View live