Linux/Unix Remediation Report
This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also...
View ArticleWindows Software Summary
This report identifies installed software across a series of hosts. Utilizing Nessus plugin 20811, Microsoft Windows Installed Software Enumeration (credentialed check), it is possible to enumerate...
View ArticleLinux/Unix Software Summary
This report identifies installed software across a series of hosts, utilizing Nessus plugin 22869, Software Enumeration (SSH). This plugin lists the software installed on the remote host by calling the...
View ArticleIAVM Executive Summary Report
The US Cyber Command (USCYBERCOM) publishes Information Assurance Vulnerability Management (IAVM) Notices for the DoD. This report provides an executive summary to the current IAVM program.
View ArticleMobile Summary Report
This report provides an executive summary of the current Mobile Device Management (MDM) status. The report was created using the new features within SecurityCenter 4.7 and the features within Nessus to...
View ArticleExecutive Age Summary Report
Using a series of charts, tables, and graphs, this overview report provides a summary for an executive to gain a high level understanding of the vulnerability management status of the network...
View ArticleExecutive Patch Mitigation Report
The report provides an executive summary of the risk mitigation efforts related to patch management. The report provides an analysis of the "Time to Mitigate" and "Time Since Mitigation".
View ArticleRemediation Instructions Report by Vulnerability
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. This report also contains steps to mitigate the...
View ArticleRemediation Instructions Report by Severity
This remediation report provides detailed information on the top discovered vulnerabilities, and lists the affected hosts tracked within SecurityCenter. The report is organized by the plugin type...
View ArticleCopyright Report
This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If...
View ArticleOracle DB Audit Report
This report displays the results from an audit check of Oracle database servers.
View ArticleMS SQL Server Audit Report
This report displays the results from an audit check of Microsoft SQL Server database servers.
View ArticleRemediation Instructions Report by Host
This Remediation Report provides detailed instructions to resolve vulnerabilities on the top 20 most vulnerable systems tracked within SecurityCenter. The report is organized by the plugin type...
View ArticleMalware Indicators Report
This executive-level report presents indicators that may reveal the presence of malware on the network and a trend graph of of these detections over the last 72 hours.
View ArticleDaily Host Alerts Report
This report presents systems and users identified by the Daily_Host_Alert LCE event.
View ArticleUnsupported OS Report
This report displays details on any unsupported operating systems that have been found in your environment via Nessus scanning. It utilizes user customizable Dynamic Asset Lists that must be enabled...
View ArticleExploitable by Malware
This report provides a detailed view into the exploitability of your network. The following chapters show which vulnerabilities are exploitable by malware, and then compares the exploitability to...
View ArticleMonthly Executive Report
This report is produced by Tenable SecurityCenter and provides a high-level executive review of vulnerability detection over the past 30 days. This report provides executive-level directors and...
View ArticleDaily Host Alerts Report: Hosts Accessed by Users
This report presents a list of all users and the hosts they have accessed, as identified by the Daily_Host_Alert LCE event.
View ArticleCritical and Exploitable Vulnerabilities Report
This report provides a summary of critical severity vulnerabilities. The report has an executive summary chapter showing tables and trend graphs highlighting the status of critical severity...
View Article