Quantcast
Channel: Tenable Security Center templates
Browsing all 423 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Linux/Unix Remediation Report

This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also...

View Article


Image may be NSFW.
Clik here to view.

Windows Software Summary

This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate...

View Article


Image may be NSFW.
Clik here to view.

Linux/Unix Software Summary

This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the...

View Article

Image may be NSFW.
Clik here to view.

IAVM Executive Summary Report

The US Cyber Command (USCYBERCOM) publishes Information Assurance Vulnerability Management (IAVM) Notices for the DoD. This report provides an executive summary to the current IAVM program.

View Article

Image may be NSFW.
Clik here to view.

Mobile Summary Report

This report provides an executive summary of the current Mobile Device Management (MDM) status. The report was created using the new features within SecurityCenter 4.7 and the features within Nessus to...

View Article


Image may be NSFW.
Clik here to view.

Executive Age Summary Report

Using a series of charts, tables, and graphs, this overview report provides a summary for an executive to gain a high level understanding of the vulnerability management status of the network...

View Article

Image may be NSFW.
Clik here to view.

Executive Patch Mitigation Report

The report provides an executive summary of the risk mitigation efforts related to patch management. The report provides an analysis of the "Time to Mitigate" and "Time Since Mitigation".

View Article

Image may be NSFW.
Clik here to view.

Remediation Instructions Report by Vulnerability

This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. This report also contains steps to mitigate the...

View Article


Image may be NSFW.
Clik here to view.

Remediation Instructions Report by Severity

This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. The report is organized by the plugin type...

View Article


Image may be NSFW.
Clik here to view.

Copyright Report

This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If...

View Article

Image may be NSFW.
Clik here to view.

Oracle DB Audit Report

This report displays the results from an audit check of Oracle database servers.

View Article

Image may be NSFW.
Clik here to view.

MS SQL Server Audit Report

This report displays the results from an audit check of Microsoft SQL Server database servers.

View Article

Image may be NSFW.
Clik here to view.

Remediation Instructions Report by Host

This Remediation Report provides detailed instructions to resolve vulnerabilities on the top 20 most vulnerable systems tracked within SecurityCenter. The report is organized by the plugin type...

View Article


Image may be NSFW.
Clik here to view.

Malware Indicators Report

This executive-level report presents indicators that may reveal the presence of malware on the network and a trend graph of of these detections over the last 72 hours.

View Article

Image may be NSFW.
Clik here to view.

Daily Host Alerts Report

This report presents systems and users identified by the Daily_Host_Alert LCE event.

View Article


Image may be NSFW.
Clik here to view.

Unsupported OS Report

This report displays details on any unsupported operating systems that have been found in your environment via Nessus scanning. It utilizes user customizable Dynamic Asset Lists that must be enabled...

View Article

Image may be NSFW.
Clik here to view.

Exploitable by Malware

This report provides a detailed view into the exploitability of your network. The following chapters show which vulnerabilities are exploitable by malware, and then compares the exploitability to...

View Article


Image may be NSFW.
Clik here to view.

Monthly Executive Report

This report is produced by Tenable SecurityCenter and provides a high-level executive review of vulnerability detection over the past 30 days. This report provides executive-level directors and...

View Article

Image may be NSFW.
Clik here to view.

Daily Host Alerts Report: Hosts Accessed by Users

This report presents a list of all users and the hosts they have accessed, as identified by the Daily_Host_Alert LCE event.

View Article

Image may be NSFW.
Clik here to view.

Critical and Exploitable Vulnerabilities Report

This report provides a summary of critical severity vulnerabilities. The report has an executive summary chapter showing tables and trend graphs highlighting the status of critical severity...

View Article
Browsing all 423 articles
Browse latest View live