On the Services and Ports tab, flag specific services and ports as either "required" or "unauthorized". These settings determine how specific services and ports are displayed in your report based on whether they should or should not be detected.
The required/unauthorized services and ports are identified by the following QIDs in the detailed results section of the scan report: 38175 (Unauthorized Service Detected), 82043 (Unauthorized Open Port Detected), 38228 (Required Service Not Detected) and 82051 (Required Port Not Detected). The filters for the report template on the Filter tab must include these QIDs. Note if Custom is selected in the Selective Vulnerability Reporting section, you must add these QIDs (in search lists).
Required Services. When a "required" service is not detected, it will be identified as a vulnerability in the report.
Available Services. This is a list of services from which you can identify required and unauthorized services. Add and Remove services between this list and the Required Services and Unauthorized Services lists.
Unauthorized Services. When an "unauthorized" service is detected, it will be identified as a vulnerability in the report.
Service Info. Displays more information about available services to help you determine which services are required and which are unauthorized. Select the service you're interested in and click View.
Required Ports. Enter ports that are required, separating each with a comma. When a "required" port is not detected, it will be identified as a vulnerability in the report.
Unauthorized Ports. Enter ports that are unauthorized, separating each with a comma. When an "unauthorized" port is detected, it will be identified as a vulnerability in the report.