Viewing vulnerabilities by object in Enterprise Scanner

Use this view to examine objects on your network or desktop computers that are a

source of vulnerabilities.

Benefits

You can analyze specific objects that are more affectedby vulnerabilities, such as

ports or URLs. You can view an object by the type, name, events, or vulnerability

type.

Field descriptions
The following table describes the fields and descriptions for this vulnerability
view:
Table28. Vulnerability view by object
Field Description
Object Type Usethis filter to analyze a specific type of
object that you suspect is the target of
attacks.
Object Name Use this filter to see events involving a
specific object according to the name of the
object.
Status You use the Status filter differently for
events and vulnerabilities.
vEvents: The Status column indicates the
impact of the event.
vVulnerabilities: The Status column
indicates whether the vulnerability was
found.
# High Security issues that allow either or both of
the following situations:
vImmediate remote or local access
vImmediate execution of code or
commands with unauthorized privileges
# Medium Security issues that have the potential of
granting access or allowing code execution
through complex or lengthy exploit
procedures, or low risk issues applied to
major Internet components.
# Low Security issues that deny service or provide
non-system information that can be used to
formulate structured attacks on a target, but
not directly gain unauthorized access.
Chapter8. Interpreting scan results in SiteProtector 113