When you select a Vulnerability from an Assessment's Results page, detail about the assessed vulnerability is displayed.
The left side of the page includes detailed information about the vulnerability as defined in the Discovery.
7 Day Assessment Trend
A graph depicts color-coded results over the past 7 days that the Assessment was run, as described below.
|
TIPS:
-
You can click individual states in State Filtering so that only the states you want to focus on are displayed in the graph. (The Compliant Objects state is always hidden by default.)
-
Hover over the graph to display the number of vulnerable objects (if any) detected per day.
-
Click on an area of the graph to display details about that Assessment run in the list below. |
|
Compliant objects |
|
Vulnerable objects |
|
Error
|
NOTE: An Error state indicates that an error occurred during data collection (for example, the server containing the objects to be evaluated could not be reached).
If an error occurred, the appropriate message displays. | |
|
Inconclusive
|
NOTE: An Inconclusive state indicates that data could not be collected for a non-error-related reason (for example, the scope of an Assessment includes Tier Zero or Privileged objects but no Tier Zero or Privileged objects were found, the number of Tier Zero or Privileged objects exceeded the maximum number (10,000) that could be evaluated, or permissions were insufficient to collect the data).
If results were inconclusive for individual objects, hover over the icon for a description of the reason. | |
Below the graph a list of the Vulnerable Objects (up to 100,000) found out of the total number of Assessed Objects for the selected area of the graph.
|
NOTEs:
-
If more than 100,000 vulnerable objects are returned, it is advisable to investigate why so many objects are found to be vulnerable. For example, all domain users may have been added to a group they don't belong in.
-
For User and Computer vulnerabilities, the column Is Account Enabled? is included, allowing you to prioritize enabled accounts when implementing a remediation. |
To download the Vulnerable Objects list to a CSV file:
From the details page for the vulnerable objects, click Export to CSV.
The file will include all of the objects displayed in the Vulnerable Objects list.