Security Reports
Security Reports are available within the console to run immediately or to schedule on a frequency desired by the user.
Important Information These reports are 'built-in' and cannot be deleted; however, you are able to mark your favorite reports as 'favorite', which will always appear at the top of your reports list. When reports are scheduled, they can be emailed into several formats including:
|
Hint Some reports also offer the 'Custom Header' option, in case a custom statement is required at the top of the report. Report logos will show Absolute by default; however, this can be changed in Custom Settings. |
Discovery: What's here?Discovery: What's here?
CIS Benchmarks | Shows environment compliance per CIS Benchmark vulnerabilities. |
Detected Security Vulnerabilities by Device | Lists all detected security vulnerabilities on each individual device. Useful for vulnerability assessment and targeted remediation planning. |
Detected Security Vulnerabilities by Family | Lists the number of devices which have detected security vulnerabilities for each selected security family. |
Detected Security Vulnerabilities by Vulnerability | Groups affected devices under each specific vulnerability, offering insight into which vulnerabilities are most widespread. |
Top X Security Vulnerabilities | Risk statistics by Device Type, count of Missing Vulnerabilities and a Risk Timeline. |
CIS Benchmarks | Ranks the most commonly detected vulnerabilities. Useful for focusing remediation efforts on the most pressing issues. |
❶ | Expand 'All Reports' > Click 'Security' > Click 'Detected Security Vulnerabilities by Family' |
❷ |
Optional: you can also add a Custom Header which will be shown on top of the report if needed. From the Security Families drop-down menu, select one or more families to include in the report. To include all available families, tick the 'All Families' checkbox Enable the 'Executive' checkbox if you want to generate a condensed one-page version of the report, ideal for high-level overviews. |
❸ |
Click 'Submit' button. The report output will include an alphabetically-ordered list of devices, grouped by the selected security vulnerability families. |