Consultant Template: Layout

Determine the sorting method for report details and specify  the sections that you want to include in the consultant report. (Note: The consultant templates and reports are available for Consultant subscriptions only.)

 

Sort by

Determine how results should be organized. You can sort host results by any of the following: host (the default), vulnerability, operating system, asset group, service or port.

 

Sections and Layout

Specify how much information you want to display in the report. Each section selected in the template is included in the report. Note that the Layout area highlights where each section appears. As you clear (uncheck) options in the Sections area, those sections are removed from the Layout preview so that you can see how the report will look.

Contact Information. If defined, contact information for both customer and consultant report will be displayed on the cover page of reports formatted in PDF and DOCX and in the header section of reports formatted in HTML and MHT. Define your customer contact information on the Customer Info tab, and define your contact information on the Consultant Info tabs.

Summary Sections. Select to display user-defined summary information. If defined, summary information will displayed on the cover page of reports formatted in PDF and DOCX and in the header section of reports formatted in HTML and MHT. Define your summary information on the Summary tab.

Vulnerability Summary. Select to display the total number of vulnerabilities detected and the overall security risk. Select Text Summary to add the following tables to the summary: total vulnerabilities by status, total vulnerabilities by severity, and top 5 vulnerability categories detected. Select Graphics to add graphics to the summary.

Appendix. Select to attach an appendix to the end of your report with additional information about your scan results. The appendix provides additional information, including a list of hosts that were scanned and hosts that were not scanned, hosts that were authenticated to successfully and hosts for which authentication failed, as well as a report legend describing severity levels. See Appendix for detailed information.

Vulnerability Details

Select to display a list of vulnerabilities detected for each host. Then determine which details to include for each vulnerability. Select one or more options.

Threat. A description of the threat.

Impact. Possible consequences that may occur if the vulnerability is exploited.

Solution. Your options are: Patches and Workarounds and Virtual Patches and Mitigating Controls (virtual patch information that is correlated with the vulnerability, when this information is available in the KnowledgeBase. The service correlates virtual patch information obtained from Trend Micro real-time feeds).

Compliance. Compliance information associated with this vulnerability. Compliance types that may be included in your report include SOX, HIPAA, GLBA and CobIT.

Exploitability. Exploitability information that is correlated with this vulnerability, when this information is available in the KnowledgeBase. The service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources.

Associated Malware. Malware information that is correlated with this vulnerability, when this information is available in the KnowledgeBase. The service constantly correlates malware information obtained from Trend Micro Threat Encyclopedia real-time feeds to provide up to date references to malware threats and related security resources.

Results. Specific scan test results for each host. Also included: the date the vulnerability was first detected on the host, the date it was last detected on the host, and the total number of times it was detected on the host.