Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Purpose

Use this article as a guideline to understand the critical aspects of your companies vulnerabilities, Risk factors, Compliances …

Dashboard

Dashboard reports are generated once the Agent is installed and the Vulnerability scan is run. This application will be able to generate company-wise reports as well as consolidated reports.

Click on the Dashboard → In the search dropdown select either a specific company or All for consolidated data of all available companies.

Here, we have selected All in the search dropdown for better illustration. Once Clicked, Page with Vulnerability Overview can be viewed. This section has 7 exclusive data dashboards such as Vulnerability Overview, Host Tables, Vulnerability Table, Compliance Overview, Reports Table, Executive Summary and Overview, with different analytical combinations, which helps management to make better decisions.

Will define each sections starting with

Vulnerability Overview

Towards the left corner, consolidated data pertaining to all companies are analyzed and classified under Critical, High, Medium and Low-Risk Vulnerabilities.

The pie chart represents the Top 10 Host level Vulnerabilities and the % pertaining to each IP address

Left Pie-chart represents the % wise Critical, High, Medium and Low-risk Vulnerabilities that are displayed in the top left corner.

Right Graphical represents the Top Vulnerability risk score with % of Risk

In this graphical representation, Top 10 OS Level Vulnerabilities for all the active OS that was scanned and identified during initial Vulnerabilities Scan.

Left side data represents IP wise Vulnerabilities with %.

In the right Graphical representation, Will find the consolidated % of all the available companies and bifurcated into Critical and safe zone.

Host Tables

This Host table specifies the Vulnerabilities count in ascending order for each IP address that has been discovered during the initial Vulnerability scan.

This section specifies the top Critical host discovered among all the active devices discovered during the scan.

The graphical representation is the data of the same data that is been populated in the left.

Vulnerability Table

This table defines each Vulnerability with Severity, Base score, Product specifications related to that vulnerability, and the total no of IP in each defined Vulnerability.

Compliance Overview

This gives an overall Compliance with pertaining to Fail Risk, Error Compliance, Closed and Open Compliance.

Left has numbers specifies Fail Risk, Error Compliance, Closed and Open Compliance of all the discovered devices during the Vulnerability Scan.

Graphs show the Top 10 host-level compliance of the active devices that were scanned. and the top OS Level Compliance for all the OS that was discovered.

This graph represents the compliance of all discovered OS in the Company with the % of the compliance.

Note: Higher the compliance safer your systems are.

The pie chart shows the Compliance and non-compliance % of the consolidated devices.

The Graph represents % Compliance score.

The bar graph represents IP/Host wise Compliance % data.

Report Table

In this section, will be able to download company-wise, specified reports and can incorporate Company Lodo and Name is each printable report. This report tables can be customizable bases on customer requirements.

  • No labels