Applies to Product: | USM Appliance™ | AlienVault OSSIM® |
The Asset Vulnerability Details section summarizes all current vulnerabilities found in the scan jobs by the number of vulnerabilities, in descending order. The first line refers to all scans and the following lines refers to the scans done on every host.
Field |
Description |
---|---|
Host-IP |
Shows the hostname and IP of the host. The first line ‘All’ summarizes all hosts. |
Date/Time |
Shows the exact date and time that the scan occurred. |
Owner | Indicates the user who created the scan. |
Profile |
Indicates the chosen profile to run the scan. |
|
Displays the number of Critical vulnerabilities found in the latest scan. |
|
Displays the number of High vulnerabilities found in the latest scan. |
|
Displays the number of Medium vulnerabilities found in the latest scan. |
|
Displays the number of Low vulnerabilities found in the latest scan. |
|
Displays the number of Info vulnerabilities found in the latest scan. |
|
Results of the scan job in HTML within the same browser. |
|
Exports the results of the scan job to a PDF file. The browser, such as Chrome, may open it in a different tab if it recognizes the file extension. |
|
Exports the results of the scan job to an Excel file. |
|
Deletes the report. |
For details about the threshold of vulnerabilities, see Changing the Vulnerability Ticket Threshold.
To filter the data
-
In the empty box above the table, enter an IP address of a host/network (default), the name a service, or a free text. Use the following definitions to help you select which one to use:
- Host/Net: Searches the IP address of a single host or a range of IP addresses in a subnet (for example, 10.80.50.73, 10.80.50.1/24).
- Service: Searches the security service identified in the vulnerability (for example, ssh, http, or https, as seen in the By Services -Top 10 pie chart).
- Free text: Searches the details of a vulnerability using free text.
- Select the corresponding radio button.
- Click Find.
Another way to filter the data is by using the pie chart above the Current Vulnerabilities. In the following example, we can see that the https service has 18 vulnerabilities (between the square brackets):
To see which hosts have such vulnerabilities