Field descriptions
The following table describes the fields and descriptions for this vulnerability
view:
Table26. Vulnerability view by asset
Field Description
Target IP Use this filter to monitor a specific IP
address that you suspect is the target of
attacks. The IP address can be either internal
or external. This information is typically
modified for you as you explore event data.
vIf you do not know the exact IP address,
use the options in the Operation list to
request IP addresses when you do not the
exact one to request.
vIf you only know the IP address you do
not want to see, you can exclude one or
more IP addresses.
Target DNS Name Use the filter to display the Domain Name
Service (DNS) name of a host that you
suspect is the target of events. Youcan also
use this filter to suppress hosts that you do
not want to monitor.
Status Use the Status filter differently for events
and vulnerabilities.
vEvents: The Status column indicates the
impact of the event.
vVulnerabilities: The Status column
indicates whether the vulnerability was
found.
# High Security issues that allow either or both of
the following situations:
vImmediate remote or local access
vImmediate execution of code or
commands with unauthorized privileges
# Medium Security issues that have the potential of
granting access or allowing code execution
through complex or lengthy exploit
procedures, or low risk issues applied to
major Internet components.
# Low Security issues that deny service or provide
non-system information that can be used to
formulate structured attacks on a target, but
not directly gain unauthorized access.
Chapter8. Interpreting scan results in SiteProtector 109