Quantcast
Channel: Tenable Security Center templates
Browsing all 423 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Network Service Vulnerabilities

This report enumerates known network services, such as Apple Bonjour, Cisco NetFlow, and Samba. The report displays information for enforcing and verifying IT management policies relating to assets,...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Trending with Scanning, Sniffing and Logging

With the introduction of the Log Correlation Engine 4.2, vulnerabilities and systems can now be discovered through log analysis. This report leverages log analysis discovery along with Nessus scanning...

View Article


Image may be NSFW.
Clik here to view.

Application Development Vulnerabilities

This report enumerates known application development software, such as VBScript, Xcode, and Java Development Kit. The report displays information for enforcing and verifying IT management policies...

View Article

Image may be NSFW.
Clik here to view.

Apple Vulnerabilty Report

This report enumerates known Apple Vulnerabilities, such as Desktop Applications, Operating System, and Hardware. The report displays information for enforcing and verifying IT management policies...

View Article

Image may be NSFW.
Clik here to view.

Apache Vulnerability Report

This report enumerates known Apache Vulnerabilities, such as PHP, Web Development, and Collaboration. The report displays information for enforcing and verifying IT management policies relating to...

View Article


Image may be NSFW.
Clik here to view.

Media Player Vulnerabilty Report

This report enumerates known Media Player Vulnerabilities, such as Apple iTunes, Cisco Video Surveillance, and Adobe Media Player. The report displays information for enforcing and verifying IT...

View Article

Image may be NSFW.
Clik here to view.

Database Software Vulnerabilities

This report enumerates known databases and resources, such as Microsoft SQL Server, MySQL, and Oracle. The report displays information for enforcing and verifying IT management policies relating to...

View Article

Image may be NSFW.
Clik here to view.

Adobe Software Vulnerabilities

This report enumerates known software developed by Adobe, such as Reader, Flash Player, Shockwave, and AIR. The report displays information for enforcing and verifying IT management policies relating...

View Article


Image may be NSFW.
Clik here to view.

Desktop Application Vulnerability Report

This report enumerates known Desktop Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for enforcing...

View Article


Image may be NSFW.
Clik here to view.

Cisco Software Vulnerabilities

This report enumerates known software & hardware manufactured by Cisco Systems, such as router IOS, VPN client and collaboration suites. The report displays information for enforcing and verifying...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Application Vulnerability Report

This report enumerates known Enterprise Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for...

View Article

Image may be NSFW.
Clik here to view.

EMC Software Vulnerabilities

This report enumerates known software and hardware manufactured by EMC2, such as EMC2 NetWorker Module, VMware ESXi, and RSA Authentication Client. The report displays information for enforcing and...

View Article

Image may be NSFW.
Clik here to view.

Oracle Software Vulnerabilities

This report enumerates known software and hardware manufactured by Oracle, such as Sun Servers, Java, database, and web technologies. The report displays information for enforcing and verifying IT...

View Article


Image may be NSFW.
Clik here to view.

IBM Software Vulnerabilities

This report enumerates known hardware and software manufactured by IBM, such as DB2, IBM Lotus Domino, and IBM InfoSphere. The report displays information for enforcing and verifying IT management...

View Article

Image may be NSFW.
Clik here to view.

HP Software Vulnerabilities

This report enumerates known software and hardware manufactured by HP, such as HP System Management, HP OpenView, and HP Data Protector. The report displays information for enforcing and verifying IT...

View Article


Image may be NSFW.
Clik here to view.

PCI DSS Indicators Report

The PCI Indicator report provides the information found when using the "PCI DSS Indicators Dashboard". The report is comprised of five chapters, with individual sections containing descriptive...

View Article

Image may be NSFW.
Clik here to view.

IT-Grundschutz BSI-100-2 Report Template

Required - IT-Grundschutz BSI-100-2 audit file, Nessus, and SecurityCenter 4.6 or higherThe IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in...

View Article


Image may be NSFW.
Clik here to view.

Vulnerabilities Over 30 Days Report

This report provides a detailed view of the long-term vulnerability status, by reporting on vulnerabilities older than 30 days. Using SecurityCenter’s advanced cross-referencing functionality, the...

View Article

Image may be NSFW.
Clik here to view.

Event Indicator Alert Report

This report provides the event summaries of each system that has been identified to have more than one "indicator" event type. The indicator event is a correlation of specific events associated with...

View Article

Image may be NSFW.
Clik here to view.

Windows Remediation Report

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also...

View Article
Browsing all 423 articles
Browse latest View live