![IBM Proventia Network Enterprise User Manual Download Page 180](http://html.mh-extra.com/html/ibm/proventia-network-enterprise/proventia-network-enterprise_user-manual_608165180.webp)
Chapter 12: Interpreting Scan Results
180
IBM Internet Security Systems
Assessment Report Descriptions
Introduction
This topic provides a brief description of each assessment report.
Available
assessment
reports
The Assessment reports that appear on the Report tab are as follows:
Report
Description
Asset Assessment Detail
A detailed list of vulnerabilities and services for each asset,
including vulnerability remedies and references.
Asset Assessment Summary
A list of discovered assets, and for each asset, its network
services and vulnerabilities.
Operating System Summary
Percentage and number of assets by operating system discovered
during an automated network scan.
Operating System Summary
by Asset
A list of assets scanned, and for each asset, its operating systems.
Service Summary
A list of services discovered.
Service Summary by Asset
A list of services discovered for each asset scanned.
Top Vulnerabilities
A list of the top vulnerabilities, by frequency, for a specified group
and time.
Vulnerability by Asset
A lists of the top assets by number of vulnerabilities for a specified
group and time.
Vulnerability by Group
A comparison of vulnerabilities across subgroups of a selected
group.
Vulnerability by OS
A comparison of vulnerability counts by Operating Systems.
Vulnerability Counts
A list detected of vulnerabilities by total number and by
percentage.
Vulnerability Counts by Asset
Number of vulnerabilities discovered for each asset by severity.
Vulnerability Detail by Asset
A detailed list of all vulnerability information available for each
asset.
Vulnerability Differential
A summary comparison of vulnerabilities and details for each
asset.
Vulnerability Names by Asset
A list of vulnerability names for each asset.
Vulnerability Remedies by
Asset
A list of vulnerabilities their remedies for each asset.
Vulnerability Summary by
Asset
A list of vulnerabilities and their descriptions for each asset.
Vulnerable Assets
A lists of assets by criticality for each vulnerability.
Table 65:
Assessment report descriptions
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......