Field descriptions

The following table describes the fields and descriptions for this vulnerability view:

Table 26. Vulnerability view by asset

Field

Description

 

 

Target IP

Use this filter to monitor a specific IP

 

address that you suspect is the target of

 

attacks. The IP address can be either internal

 

or external. This information is typically

 

modified for you as you explore event data.

 

v If you do not know the exact IP address,

 

use the options in the Operation list to

 

request IP addresses when you do not the

 

exact one to request.

 

v If you only know the IP address you do

 

not want to see, you can exclude one or

 

more IP addresses.

 

 

Target DNS Name

Use the filter to display the Domain Name

 

Service (DNS) name of a host that you

 

suspect is the target of events. You can also

 

use this filter to suppress hosts that you do

 

not want to monitor.

 

 

Status

Use the Status filter differently for events

 

and vulnerabilities.

 

v Events: The Status column indicates the

 

impact of the event.

 

v Vulnerabilities: The Status column

 

indicates whether the vulnerability was

 

found.

 

 

# High

Security issues that allow either or both of

 

the following situations:

 

v Immediate remote or local access

 

v Immediate execution of code or

 

commands with unauthorized privileges

 

 

# Medium

Security issues that have the potential of

 

granting access or allowing code execution

 

through complex or lengthy exploit

 

procedures, or low risk issues applied to

 

major Internet components.

 

 

# Low

Security issues that deny service or provide

 

non-system information that can be used to

 

formulate structured attacks on a target, but

 

not directly gain unauthorized access.

 

 

Chapter 8. Interpreting scan results in SiteProtector 109

Page 117
Image 117
IBM Partner Pavilion 2.3 manual Field descriptions, Field Description