Quantcast
Channel: Tenable Security Center templates
Browsing all 423 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CCE to NIST 800-53 Reports

Requirements:

View Article


Image may be NSFW.
Clik here to view.

CCI to NIST 800-53 Reports

 Requirements: 

View Article


Image may be NSFW.
Clik here to view.

SANS Top 20 Report Template

As published by SANS, the goal of the Top 20 Critical Controls is to protect assets, infrastructure, and information by strengthening your organizations defensive posture through continuous automated...

View Article

Image may be NSFW.
Clik here to view.

Consolidation Report for Missing Patches

This report uses the new Nessus “Patch Report” plugin (ID #66334) and will provide a consolidated missing patch report for each host within the network. The report uses the iterator grouping element to...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Windows Wireless Network History

Using the Nessus plugin 66350 "Microsoft Windows Wireless Network History", this report tracks the networks a Windows computer has connected too. This reporting is possible via the Network Location...

View Article


Image may be NSFW.
Clik here to view.

Outstanding Remediations Tracking

This report template tracks the number of unique remediations required to keep systems fully patched over time. It leverages color coding to indicates systems missing one, two, three or more...

View Article

Image may be NSFW.
Clik here to view.

Common Application Vendor Vulnerabilities

This report enumerates known application vendors such as Adobe, Microsoft and Cisco. The report displays information for enforcing and verifying IT management policies relating to assets, such as...

View Article

Image may be NSFW.
Clik here to view.

Web Service Vulnerabilities

This report enumerates known web services, such as Adobe ColdFusion, Apache HTTP Server, and Citrix CloudPlatform. The report displays information for enforcing and verifying IT management policies...

View Article


Image may be NSFW.
Clik here to view.

Web Technology Vulnerability Report

This report enumerates known Web Technology Vulnerabilities, such as Oracle Java, PHP, and Apple QuickTime. The report displays information for enforcing and verifying IT management policies relating...

View Article


Image may be NSFW.
Clik here to view.

Web Browser Vulnerability Report

This report enumerates known Web Browser Vulnerabilities, such as Microsoft IE, Apple Safari, and Google Chrome. The report displays information for enforcing and verifying IT management policies...

View Article

Image may be NSFW.
Clik here to view.

Virtual Computing Vulnerabilities

This report enumerates known Virtualized Computing Software, such as VMware, Oracle VirtualBox, and Parallels Desktop. The report displays information for enforcing and verifying IT management policies...

View Article

Image may be NSFW.
Clik here to view.

Update Services Vulnerabilities Report

This report enumerates known Update Vulnerability Services, such as Red Hat up2date, Adobe Updater, and Oracle Java Auto Updater. The report displays information for enforcing and verifying IT...

View Article

Image may be NSFW.
Clik here to view.

Office Suite Vulnerabilities

This report enumerates known Office Suites, such as Microsoft Office, Sun StarOffice, and Apple Keynote. The report displays information for enforcing and verifying IT management policies relating to...

View Article


Image may be NSFW.
Clik here to view.

Storage and Backup Vulnerability Report

This report enumerates known [TOPIC], such as ComputerAssociates ARCserve, EMC NetWorker, and Symantec Veritas. The report displays information for enforcing and verifying IT management policies...

View Article

Image may be NSFW.
Clik here to view.

Remote Access Vulnerability Report

This report enumerates known Remote Access Vulnerabilities, such as Cisco AnyConnect, Citrix GoToAssist, and Symantec PCAnywhere. The report displays information for enforcing and verifying IT...

View Article


Image may be NSFW.
Clik here to view.

Security Software Vulnerabilities

This report enumerates known security software tools and resources, such as McAfee Antivirus, Microsoft Forefront, and Symantec PGP. The report displays information for enforcing and verifying IT...

View Article

Image may be NSFW.
Clik here to view.

Web Development Software Vulnerabilities

This report enumerates known software used for web development, such as Adobe Dreamweaver, Adobe GoLive, and Apple xCode. The report displays information for enforcing and verifying IT management...

View Article


Image may be NSFW.
Clik here to view.

Print Services Vulnerability Report

This report enumerates known Print Services Vulnerabilities, such as HP Jetadmin and IBM InfoPrint. The report displays information for enforcing and verifying IT management policies relating to...

View Article

Image may be NSFW.
Clik here to view.

Operating System Vulnerability Report

This report enumerates known Operating Systems Vulnerabilities, such as Microsoft, Apple, and various Linux distributions. The report displays information for enforcing and verifying IT management...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Management Software Vulnerabilities

This report enumerates known enterprise management tools and resources, such as Red Hat RHEL Cluster, Sun Embedded Lights Out Manager, and CA Desktop Management Suite. The report displays information...

View Article
Browsing all 423 articles
Browse latest View live