Chapter 12: Interpreting Scan Results
176
IBM Internet Security Systems
Viewing Vulnerabilities by Detail
Introduction
You can examine event details that may be related to an attack or that you consider
unusual.
Benefits
You analyze event data to evaluate the effectiveness of your system's security and to
investigate any suspicious activity. You can analyze event data in several ways:
●
examine events affecting specific agents, hosts, and groups
●
review high-level results and trends for groups or Sites. This method is particularly
useful for printing or distributing reports about network and host security status
Field descriptions
The following table describes the fields and descriptions for this vulnerability view:
Field
Description
Tag Name
Use this filter to display or suppress events that match one or
more tag names. You can filter on tag names from the Site
database or on user-defined tag names.
Severity
Use this filter to display events according to their level of severity.
Status
You use the Status filter differently for events and vulnerabilities.
•
Events: The Status column indicates the impact of the event.
•
Vulnerabilities: The Status column indicates whether the
vulnerability was found.
Use this filter to show only the statuses that interest you.
Target IP
Use this filter to monitor a specific IP address that you suspect is
the target of attacks. The IP address can be either internal or
external. This information is typically modified for you as you
explore event data.
•
If you do not know the exact IP address, use the options in the
Operation list to request IP addresses when you do not the
exact one to request.
•
If you only know the IP address you do not want to see, you
can exclude one or more IP addresses.
Agent DNS Name
Use this filter to display or suppress events that match the Domain
Name Service (DNS) name of a host computer where a agent is
installed.
Object Type
Use this filter to analyze a specific type of object that you suspect
is the target of attacks.
Object Name
Use this filter to see events involving a specific object according to
the object's name.
User Name
Use this filter to display or suppress events that match the User
Name, if any, associated with an event.
Source Port
The port on which the vulnerability was detected.
algorithm-id
This is a check id used by IBM ISS to identify the check.
Table 63:
Vulnerability analysis–detail fields
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......