Scan Template: Display

On the Display tab, identify how much information to include in the report summary and detailed results sections of your report.

Set display options in the following sections:

Summary of Vulnerabilities

Graphics

Sorting

Include Options

 


Report Summary: Summary of Vulnerabilities

The Summary of Vulnerabilities section of your scan report always displays the total number of vulnerabilities detected and the overall security risk. In Auto reports, the overall business risk is also displayed.

Text Summary. Select to add the following tables to the summary: total vulnerabilities by status, total vulnerabilities by severity, and top 5 vulnerability categories detected. Note that you can also display this information through graphics.

Back to Top

 


Report Summary: Graphics

Select graphics to include in the report. See Graphics for a complete description of your options.

Back to Top

 


Detailed Results: Sorting

Sort by. Determine how results should be organized. You can sort host results by any of the following: host (the default), vulnerability, operating system, asset group, service or port. See Organizing Host Results for a visual representation of how results will appear based on your selection.

Back to Top

 


Detailed Results: Include Options

Text Summary. Select to include a text summary in the Detailed Results section of your report. The text summary includes the total number of vulnerabilities detected, the overall security risk, and the business risk (for reports sorted by asset group). The following tables also appear: total vulnerabilities by status, total vulnerabilities by severity, and top 5 vulnerability categories detected. Note that this option is not available in reports set to Manual scan results selection.

Vulnerability Details. Select to display a list of vulnerabilities detected for each host. Then determine which details to include for each vulnerability. Your options are:

      Threat. A description of the threat.

      Impact. Possible consequences that may occur if the vulnerability is exploited.

      Solution:

      Patches and Workarounds. A verified solution to remedy the issue, such as a link to the vendor's patch, Web site, or a workaround.

      Virtual Patches and Mitigating Controls. Virtual patch information that is correlated with the vulnerability, when this information is available in the KnowledgeBase. The service correlates virtual patch information obtained from Trend Micro real-time feeds.

      Compliance. Compliance information associated with this vulnerability. Compliance types that may be included in your report include SOX, HIPAA, GLBA and CobIT.

      Exploitability. Exploitability information that is correlated with this vulnerability, when this information is available in the KnowledgeBase. The service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources.

      Associated Malware. Malware information that is correlated with this vulnerability, when this information is available in the KnowledgeBase. The service constantly correlates malware information obtained from Trend Micro Threat Encyclopedia real-time feeds to provide up to date references to malware threats and related security resources.

      Results. Specific scan test results for each host. Also included: the date the vulnerability was first detected on the host, the date it was last detected on the host, and the total number of times it was detected on the host.

Appendix. Select to attach an appendix to the end of your report with additional information about your scan results. The appendix provides additional information, including a list of hosts that were scanned and hosts that were not scanned, hosts that were authenticated to successfully and hosts for which authentication failed, as well as a report legend describing severity levels. See Appendix for detailed information.

Back to Top