Patching Reports
Patching Reports are available within the console to run immediately or to schedule on a frequency desired by the user.
Important Information These reports are 'built-in' and cannot be deleted; however, you are able to mark your favorite reports as 'favorite', which will always appear at the top of your reports list. When reports are scheduled, they can be emailed into several formats including:
|
Hint Some reports also offer the 'Custom Header' option, in case a custom statement is required at the top of the report. Report logos will show Absolute by default; however, this can be changed in Custom Settings. |
Discovery: What's here?Discovery: What's here?
Detected Patches by CVE | Provides a summary of missing patches across devices, grouped by CVE identifier. Useful for prioritizing patch deployment by known vulnerabilities. | |
Detected Patches by Device | Provides a count of missing patches for each device in your environment. Use this report to quickly identify which devices are lacking critical updates. | |
Detected Patches by Patch | Shows the number of devices missing each specific patch. Helps track patch deployment progress and identify which patches are least deployed. | |
HIPAA Operating System and Application Vulnerability Scan |
Shows HIPAA compliance status by listing each non-compliant device and the associated missing patches. Ideal for auditing health sector environments and maintaining regulatory compliance. *HIPAA - Health Insurance Portability and Accountability Act |
|
Patch Deployment History by Device | Shows the deployment history of patches organized by device. Helps trace which updates were applied to specific machines over time. | |
Patch Deployment History by Patch | Lists the deployment history per patch across all devices. Useful for tracking the rollout and effectiveness of individual patches. | |
PCI DSS Operating System and Application Vulnerability Scan |
Details the PCI DSS compliance status, highlighting non-compliant devices and unpatched vulnerabilities. Essential for organizations handling payment card data. *PCI DSS - Payment Card Industry Data Security Standard |
|
Security Risk Assessment |
Summarizes the overall security posture of your environment, including:
Best used for executive summaries and risk audits. |
|
SOX Operating System and Application Vulnerability Scan |
Provides SOX compliance insights by listing each device and patch that does not meet standards. Designed for companies under Sarbanes-Oxley regulations. *SOX - Sarbanes-Oxley Act |
|
Top X Patches | Lists the top detected missing patches in descending order of frequency. Helps prioritize high-impact patches. | |
Top X Vulnerable Devices |
Displays the most vulnerable devices, sorted by the number of detected patches or issues. Assists in identifying the highest-risk endpoints. |
❶ | Expand 'All Reports' > Click 'Patching' > Choose 'Security Risk Assessment' |
❷ |
Filter by Computer Group: Click '...' (three dots) next to 'All Computers' |
❸ |
Select a Site: Click 'Sites' > Choose 'Default Site' > Click 'Save' |
❹ |
Filter by Patch Group: Click '...' (three dots) next to 'All Patches' |
❺ | Select the Patch Query: Expand 'Default Queries' > Click 'Critical Patches' > Click 'Save' |
❻ |
Click 'Submit' This report will give a quick view of your environment’s current security posture. |