Quantcast
Channel: Tenable Security Center templates
Viewing all 423 articles
Browse latest View live

Daily Host Alerts Report: Users Accessing Hosts

$
0
0
Daily Host Alerts Report: Users Accessing Hosts Screenshot
This report presents a list of all hosts and the users that have accessed them, as identified by the Daily_Host_Alert LCE event.

Errors and Warnings Report

$
0
0

This report displays details on all warnings and errors identified in the environment.

The report has two main customizable sections.

The error section contains tables that present the reviewer with all errors found. By default, it is set up for display of the top 10 errors by count, and/or the last 24 hours by time. This can be easily modified to extend timeframe or display parameters. This section presents detected errors using five different methods.

CIP-002 Identification of Critical Cyber Assets Report

$
0
0
CIP-002 Identification of Critical Cyber Assets Screen Shot
For organizations that are required to be NERC compliant, SecurityCenter can lead the way to compliance. The first focus area is the “Identification of Critical Cyber Assets”. SecurityCenter uses Log Correlation Engine (LCE), Passive Vulnerability Scanner (PVS), and Nessus to identify the assets. When using the complete Tenable family of products, an organization can easily identify all critical assets and all associated assets.

Insider Threat Report

$
0
0

This report displays details on new user events that have been found in your environment. The report is broken down into 3 main areas.

The first area is Graphs and Trends.

Graphs and Trends contains trend data on logins and login failures over a 7 day period, new users, new network users, and VPN logins from unusual sources.

This area of the report contains graphs and trend data on logins and login failures over a 7 day period, new users, new network users, and VPN logins from unusual sources.

Nessus Scan Report

$
0
0

For customers who use Nessus for vulnerability scanning and then move to SecurityCenter, vulnerability reporting may be somewhat challenging. This report mimics the look and feel of a typical Nessus scanner vulnerability report.

Like a Nessus scanner report, this report contains a Table of Contents, iterates host information, and provides a results summary and vulnerability details for all hosts scanned.

Vulnerability Top Ten Executive Report

$
0
0
Vulnerability Top Ten Executive Report Screenshot
This report displays multiple top 10 lists related to network vulnerabilities.

Relative Date Summary Report

$
0
0
 Relative Date Summary Report Screen Shot
SecurityCenter supports server predefined relative date setting for trend analysis, remediation tracking, and vulnerability analysis. This report template provides five chapters using these relative date summary filters.

CVE Monthly Status Report

$
0
0

This high level report displays CVE vulnerability details for the years 2010 - 2014.

The first chapter provides a graphical overview of CVE vulnerabilities in 3 pie charts that represent both vulnerabilities and recently mitigated vulnerabilities. Presented is a graphical overview of the current CVE vulnerability status of the environment. These three charts present CVE vulnerability information by severity, count and percentage.


PVS Detections Report - Traffic

$
0
0
PVS Detections Report Screenshot
This report presents network traffic passively detected by the Passive Vulnerability Scanner (PVS).

Compliance Summary Report

$
0
0
 Compliance Summary Screen Shot
This report provides a template for reporting on 13 compliance standards. Each compliance standard is summarized with historic matrix, host summary table, and the compliance check summary table. The report is designed to provide a full report or a subset of reporting. The compliance officer or security manager can import this report using the app feed, and by selecting the specific chapters, the report can be easily customized.

PVS Detections Report - Vulnerabilities and Attacks

$
0
0
PVS Detections Report Screenshot
This report presents vulnerabilities and attacks passively detected by the Passive Vulnerability Scanner (PVS).

PVS Detections Report - Devices and Services

$
0
0
PVS Detections Report Screenshot
This report presents devices and services passively detected by the Passive Vulnerability Scanner (PVS).

Council on CyberSecurity - Critical Security Controls Report

$
0
0
Council on CyberSecurity Critical Security Controls Report
This report covers many controls found in the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to protect assets, infrastructure, and information by strengthening your organization’s defensive posture through continuous automated protection and monitoring.

PVS Detections Report - Top 50 Exploitable Vulnerabilities

$
0
0
PVS Detections Report Screenshot
This report presents the top 50 exploitable vulnerabilities passively detected by the Passive Vulnerability Scanner (PVS).

TCP Metrics Report

$
0
0
TCP Report Screen Shot
This report provides security professionals with detailed statistics for TCP port usage across all Tenable products. For each product (Nessus, PVS and LCE), a chapter is dedicated to port usage statistics.

PVS Detections Executive Report

$
0
0
PVS Detections Executive Report Screenshot
This executive report presents indications of the network traffic passively detected by the Passive Vulnerability Scanner (PVS). This enables network awareness and may highlight network vulnerabilities.

Group Management Report

$
0
0
Group Management Report
This report provides a detailed analysis of the group membership across many platforms. The supported platforms are Windows, OS X, and LDAP. The report is structured to provide a summary list of systems, and then enumerate the group membership. The report provides details on group membership though SMB enumeration, LDAP search queries, ADSI, and parsing of system configuration files.

PCI Configuration Report

$
0
0

This report template leverages Nessus PCI system configuration results to track which PCI DSS requirements are compliant or non-compliant.

If you need to track which PCI requirements your group is compliant with and you are performing credentialed Nessus configuration audits of your systems, then this SecurityCenter report template can be used to track which requirements are currently being met or not.

Account Weakness Report

$
0
0
Account Weakness Report Screenshot
This report presents vulnerabilities related to accounts and credentials. These vulnerabilities include default accounts, blank passwords, bypassing of authentication, insecure and non-compliant account settings, and more.

NetFlow Monitor Report

$
0
0
Sample image from Chapter 4 of the report.

This report displays event statistics leveraging the capabilities of Tenable Netflow Normalized Events. This event data is correlated to produce a series of pie charts, tables, and trends lines to display statistical data. The report is based on the the components present in the NetFlow Monitor Dashboard.

Netflow data that is being forwarded to Tenable’s LCE includes ports, source and destination IP address. The chapters in this report include:

Top Talkers (All Traffic)

Viewing all 423 articles
Browse latest View live