HeartBleed Report
This report template identifies the details on systems vulnerable to the newly identified HeartBleed vulnerability. Using all the tools available to SecurityCenter users, Tenable has several methods of...
View ArticleSocial Network Activity Executive Report
This report presents information about social networking activity on the network.
View ArticleFortiGate Scan Report
This report leverages the Tenable FortiGate Best Practices Audit and other plugins to provide security settings and other useful information on FortiGate device configuration to an...
View ArticleSystem Configuration Report
This report presents configuration information for all hosts on the network that have been scanned by Nessus.
View ArticleAdmin Discovery Report
This report displays details on Administrator accounts that have been found in your environment via LCE and active Nessus scanning. Provided are details on:Administrative accounts that have been...
View ArticleInternet Explorer Zero Day Report
The latest zero-day Internet Explorer vulnerability leaves organizations open to new attacks using remote execution exploits. How vulnerable is your organization? With this report, SecurityCenter...
View ArticleCloud Storage Executive Report
This report presents interactions with cloud file storage services, such as Dropbox, OneDrive, and iCloud, detected over the last 7 days.
View ArticleNessus Scan Report (Top 5)
For customers who use Nessus for vulnerability scanning and then move to SecurityCenter, vulnerability reporting may be somewhat challenging. This report mimics the look and feel of a typical Nessus...
View ArticleWeb Activity Report
This report presents web activity detected in the last 72 hours, with some 7-day trending. This report can be used to monitor web accesses and look for suspicious or potentially unauthorized activity.
View ArticleSCAP Audit Summary Report
SecurityCenter users are able to embrace the NIST security automation agenda through more efficient use of devices with SCAP audit file support, and advanced reporting using the dashboards and reports...
View ArticleCVE Iterator Report
This report displays CVE vulnerability information. The first section of the report provides graphical CVE summary results in 5 year blocks by severity. It is followed by a CVE Trend over the last 90...
View ArticlePassive OS Detection Report
This report presents passive detections of operating systems, using PVS plugin 1. Charts present the number of hosts with detected operating systems within major groups, as well as a 7-day trends of...
View ArticleOpenSSL ChangeCipherSpec Report
As new threats emerge in networks, SecurityCenter customers are able to properly identify risk. This report identifies systems vulnerable to the new OpenSSL ChangeCipherSpec vulnerability.
View ArticleFireEye Status Report
This Report and all associated components require the following:Nessus audit file, and successful post scan audit file results. [TNS_BestPractice_FireEye.audit]FireEye Dynamic Asset. [FireEye...
View ArticleOWASP Top 10 Report
Web application security is a key concern for SecurityCenter users. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security...
View ArticleQualitative Risk Analysis with CVSS Scores
Information Security professionals continuously perform various types of risk assessments within their environment. SecurityCenter users have a secret weapon in the battle to properly assess risk, and...
View ArticleUnknown Processes
This report displays unknown processes, gray area processes, and known installed software across a series of components.
View ArticleIncident Response Report
This report displays incident response details on Systems that have been found in your environment to have active intrusion events. Intrusion events are events that are triggered by plugin 800125 -...
View ArticleMAS TRM Guidelines Report
The Monetary Authority of Singapore (MAS) published new Technology Risk Management (TRM) Guidelines in June 2013. The MAS TRM Guidelines report provides a high-level overview of information relevant to...
View ArticleEvent Analysis Report
This report contains information that provides an overview of collected events. This provides the analyst with many different methods to quickly locate actionable context in your data. Its counterpart...
View Article