Table31. Assessment reports descriptions (continued)
Report Description
Top Vulnerabilities A list of the top vulnerabilities, by frequency,
for a specified group and time.
Vulnerability byAsset A list of the top assets by number of
vulnerabilities for a specified group and
time.
Vulnerability by Group A comparison of vulnerabilities across
subgroups of a selected group.
Vulnerability by OS A comparison of vulnerability counts by
operating systems.
Vulnerability Counts A list of detected vulnerabilities by total
number and by percentage.
Vulnerability Counts byAsset Thenumber of vulnerabilities discovered for
each asset by severity.
Vulnerability Detail byAsset A detailed list of all vulnerability
information available for each asset.
Vulnerability Differential A summary comparison of vulnerabilities
and details for each asset.
Vulnerability Names byAssets Alist of vulnerability names for each asset.
Vulnerability Remedies byAsset Alist of vulnerabilities their remedies for
each asset.
Vulnerability Summary byAsset Alist of vulnerabilities and their
descriptions for each asset.
VulnerabilityAssets Alists of assets by criticality for each
vulnerability.
118 Enterprise Scanner: User Guide