Security Reports

Security Reports are available within the console to run immediately or to schedule on a frequency desired by the user.

Important Information

These reports are 'built-in' and cannot be deleted; however, you are able to mark your favorite reports as 'favorite', which will always appear at the top of your reports list.

When reports are scheduled, they can be emailed into several formats including:

  • Adobe PDF
  • Microsoft Excel File
  • Comma-Separated Values File
  • HTML5 File
  • JSON File

Hint

Some reports also offer the 'Custom Header' option, in case a custom statement is required at the top of the report. Report logos will show Absolute by default; however, this can be changed in Custom Settings.

Discovery: What's here?Discovery: What's here?

CIS Benchmarks Shows environment compliance per CIS Benchmark vulnerabilities.
Detected Security Vulnerabilities by Device Lists all detected security vulnerabilities on each individual device. Useful for vulnerability assessment and targeted remediation planning.
Detected Security Vulnerabilities by Family Lists the number of devices which have detected security vulnerabilities for each selected security family.
Detected Security Vulnerabilities by Vulnerability Groups affected devices under each specific vulnerability, offering insight into which vulnerabilities are most widespread.
Top X Security Vulnerabilities Risk statistics by Device Type, count of Missing Vulnerabilities and a Risk Timeline.  
CIS Benchmarks Ranks the most commonly detected vulnerabilities. Useful for focusing remediation efforts on the most pressing issues.

Guided walk-through: How to Run a Detected Security Vulnerabilities Report for all DevicesGuided walk-through: How to Run a Detected Security Vulnerabilities Report for all Devices

Expand 'All Reports' > Click 'Security' > Click 'Detected Security Vulnerabilities by Family'

Optional: you can also add a Custom Header which will be shown on top of the report if needed.

From the Security Families drop-down menu, select one or more families to include in the report.

To include all available families, tick the 'All Families' checkbox

Enable the 'Executive' checkbox if you want to generate a condensed one-page version of the report, ideal for high-level overviews.

Click 'Submit' button.

The report output will include an alphabetically-ordered list of devices, grouped by the selected security vulnerability families.