Viewing vulnerabilities by object in Enterprise Scanner

Use this view to examine objects on your network or desktop computers that are a source of vulnerabilities.

Benefits

You can analyze specific objects that are more affected by vulnerabilities, such as ports or URLs. You can view an object by the type, name, events, or vulnerability type.

Field descriptions

The following table describes the fields and descriptions for this vulnerability view:

Table 28. Vulnerability view by object

Field

Description

 

 

Object Type

Use this filter to analyze a specific type of

 

object that you suspect is the target of

 

attacks.

 

 

Object Name

Use this filter to see events involving a

 

specific object according to the name of the

 

object.

 

 

Status

You use the Status filter differently for

 

events and vulnerabilities.

 

v Events: The Status column indicates the

 

impact of the event.

 

v Vulnerabilities: The Status column

 

indicates whether the vulnerability was

 

found.

 

 

# High

Security issues that allow either or both of

 

the following situations:

 

v Immediate remote or local access

 

v Immediate execution of code or

 

commands with unauthorized privileges

 

 

# Medium

Security issues that have the potential of

 

granting access or allowing code execution

 

through complex or lengthy exploit

 

procedures, or low risk issues applied to

 

major Internet components.

 

 

# Low

Security issues that deny service or provide

 

non-system information that can be used to

 

formulate structured attacks on a target, but

 

not directly gain unauthorized access.

 

 

Chapter 8. Interpreting scan results in SiteProtector 113

Page 121
Image 121
IBM Partner Pavilion 2.3 manual Viewing vulnerabilities by object in Enterprise Scanner