Viewing vulnerabilities by object in Enterprise Scanner
Use this view to examine objects on your network or desktop computers that are a source of vulnerabilities.
Benefits
You can analyze specific objects that are more affected by vulnerabilities, such as ports or URLs. You can view an object by the type, name, events, or vulnerability type.
Field descriptions
The following table describes the fields and descriptions for this vulnerability view:
Table 28. Vulnerability view by object
Field | Description |
|
|
Object Type | Use this filter to analyze a specific type of |
| object that you suspect is the target of |
| attacks. |
|
|
Object Name | Use this filter to see events involving a |
| specific object according to the name of the |
| object. |
|
|
Status | You use the Status filter differently for |
| events and vulnerabilities. |
| v Events: The Status column indicates the |
| impact of the event. |
| v Vulnerabilities: The Status column |
| indicates whether the vulnerability was |
| found. |
|
|
# High | Security issues that allow either or both of |
| the following situations: |
| v Immediate remote or local access |
| v Immediate execution of code or |
| commands with unauthorized privileges |
|
|
# Medium | Security issues that have the potential of |
| granting access or allowing code execution |
| through complex or lengthy exploit |
| procedures, or low risk issues applied to |
| major Internet components. |
|
|
# Low | Security issues that deny service or provide |
| |
| formulate structured attacks on a target, but |
| not directly gain unauthorized access. |
|
|
Chapter 8. Interpreting scan results in SiteProtector 113