Chapter 12: Interpreting Scan Results
178
IBM Internet Security Systems
Viewing Vulnerabilities by Vuln Names
Introduction
Vulnerability names provides high-level information about the types of vulnerabilities
detected on your network.
Benefits
You can sort your view by most severe vulnerabilities to identify the most to least
important vulnerabilities on your network or by priority of fix.
Field descriptions
The following table describes the fields and descriptions for this vulnerability view:
Field
Description
Tag Name
Use this filter to display or suppress events that match one or
more tag names. You can filter on tag names from the Site
database or on user-defined tag names.
Severity
Use this filter to display events according to their level of severity.
Status
You use the Status filter differently for events and vulnerabilities.
•
Events: The Status column indicates the impact of the event.
•
Vulnerabilities: The Status column indicates whether the
vulnerability was found.
Use this filter to show only the statuses that interest you.
Event Count
Use this filter to determine which events occur most frequently.
Target Count
Use to filter by the count of target hosts.
Object Count
Use to filter events according to the Object Count column in the
analysis views. SiteProtector calculates the Object Count
according to the number of objects that are associated with each
row of data in the analysis view. This filter filters data only in views
that contain the Object Count column. For example, if you apply
this filter to the Attacker view, SiteProtector would apply the
criteria you specified to each IP address (or row) that appears in
the view.
Latest Event
Use to filter events according to the Latest Event column in the
analysis views. SiteProtector calculates the time and date for the
latest event on each row of data in an analysis view. This filter
filters data only in views that contain the Latest Event column. For
example, if you apply this filter to the Event Name view,
SiteProtector would apply criteria you specified to each Tag name
(or row) that appears in the view.
Table 64:
Vulnerability analysis–name fields
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......