SANS Top 20 Report Template
As published by SANS, the goal of the Top 20 Critical Controls is to protect assets, infrastructure, and information by strengthening your organizations defensive posture through continuous automated...
View ArticleConsolidation Report for Missing Patches
This report uses the new Nessus “Patch Report” plugin (ID #66334) and will provide a consolidated missing patch report for each host within the network. The report uses the iterator grouping element to...
View ArticleMicrosoft Windows Wireless Network History
Using the Nessus plugin 66350 "Microsoft Windows Wireless Network History", this report tracks the networks a Windows computer has connected too. This reporting is possible via the Network Location...
View ArticleOutstanding Remediations Tracking
This report template tracks the number of unique remediations required to keep systems fully patched over time. It leverages color coding to indicates systems missing one, two, three or more...
View ArticleCommon Application Vendor Vulnerabilities
This report enumerates known application vendors such as Adobe, Microsoft and Cisco. The report displays information for enforcing and verifying IT management policies relating to assets, such as...
View ArticleWeb Service Vulnerabilities
This report enumerates known web services, such as Adobe ColdFusion, Apache HTTP Server, and Citrix CloudPlatform. The report displays information for enforcing and verifying IT management policies...
View ArticleWeb Technology Vulnerability Report
This report enumerates known Web Technology Vulnerabilities, such as Oracle Java, PHP, and Apple QuickTime. The report displays information for enforcing and verifying IT management policies relating...
View ArticleWeb Browser Vulnerability Report
This report enumerates known Web Browser Vulnerabilities, such as Microsoft IE, Apple Safari, and Google Chrome. The report displays information for enforcing and verifying IT management policies...
View ArticleVirtual Computing Vulnerabilities
This report enumerates known Virtualized Computing Software, such as VMware, Oracle VirtualBox, and Parallels Desktop. The report displays information for enforcing and verifying IT management policies...
View ArticleUpdate Services Vulnerabilities Report
This report enumerates known Update Vulnerability Services, such as Red Hat up2date, Adobe Updater, and Oracle Java Auto Updater. The report displays information for enforcing and verifying IT...
View ArticleOffice Suite Vulnerabilities
This report enumerates known Office Suites, such as Microsoft Office, Sun StarOffice, and Apple Keynote. The report displays information for enforcing and verifying IT management policies relating to...
View ArticleStorage and Backup Vulnerability Report
This report enumerates known [TOPIC], such as ComputerAssociates ARCserve, EMC NetWorker, and Symantec Veritas. The report displays information for enforcing and verifying IT management policies...
View ArticleRemote Access Vulnerability Report
This report enumerates known Remote Access Vulnerabilities, such as Cisco AnyConnect, Citrix GoToAssist, and Symantec PCAnywhere. The report displays information for enforcing and verifying IT...
View ArticleSecurity Software Vulnerabilities
This report enumerates known security software tools and resources, such as McAfee Antivirus, Microsoft Forefront, and Symantec PGP. The report displays information for enforcing and verifying IT...
View ArticleWeb Development Software Vulnerabilities
This report enumerates known software used for web development, such as Adobe Dreamweaver, Adobe GoLive, and Apple xCode. The report displays information for enforcing and verifying IT management...
View ArticlePrint Services Vulnerability Report
This report enumerates known Print Services Vulnerabilities, such as HP Jetadmin and IBM InfoPrint. The report displays information for enforcing and verifying IT management policies relating to...
View ArticleOperating System Vulnerability Report
This report enumerates known Operating Systems Vulnerabilities, such as Microsoft, Apple, and various Linux distributions. The report displays information for enforcing and verifying IT management...
View ArticleEnterprise Management Software Vulnerabilities
This report enumerates known enterprise management tools and resources, such as Red Hat RHEL Cluster, Sun Embedded Lights Out Manager, and CA Desktop Management Suite. The report displays information...
View Article