IBM Partner Pavilion 2.3 manual Vulnerability view by vulnerability name

Models: 2.3

1 187
Download 187 pages 31.13 Kb
Page 123
Image 123

Table 29. Vulnerability view by target operating system (continued)

Field

Description

 

 

Status

Use the Status filter differently for events

 

and vulnerabilities.

 

v Events: The Status column indicates the

 

impact of the event.

 

v Vulnerabilities: The Status column

 

indicates whether the vulnerability was

 

found.

 

 

Event Count

Use this filter to determine which events

 

occur most frequently.

 

 

Target Count

Use to filter by the count of target hosts.

 

 

Latest Event

Use to filter events according to the Latest

 

Event column in the analysis views.

 

SiteProtector calculates the time and date for

 

the latest event on each row of data in an

 

analysis view. This filter filters data only in

 

views that contain the Latest Event column.

 

For example, if you apply this filter to the

 

Event Name view, SiteProtector can apply

 

the criteria you specified to each Tag name

 

(or row) that appears in the view.

 

 

Viewing vulnerabilities by vulnerability name in Enterprise Scanner

Use this view to examine high-level information about the types of vulnerabilities detected on your network.

Benefits

You can sort your view by most severe vulnerabilities to identify the most to least important vulnerabilities on your network or by priority of fix.

Field descriptions

The following table describes the fields and descriptions for this vulnerability view:

Table 30. Vulnerability view by vulnerability name

Field

Description

 

 

Tag Name

Use this filter to display or suppress events

 

that match one or more tag names. You can

 

filter on tag names from the Site database or

 

on user-defined tag names.

 

 

Severity

Use this filter to display events according to

 

their level of severity.

 

 

CVSS Score

Use this filter to establish a measure of how

 

much concern a vulnerability warrants,

 

compared to other vulnerabilities, so that

 

efforts to remedy the vulnerability can be

 

prioritized.

 

 

Chapter 8. Interpreting scan results in SiteProtector 115

Page 123
Image 123
IBM Partner Pavilion 2.3 manual Vulnerability view by vulnerability name