Comprehensive output including security holes and warnings, and informational items from Inspector’s point-of-view. The internal vulnerability scan operates behind the firewall to identify and expose real and potential vulnerabilities inside the network.
Internal Vulnerability Scan Detail by Issue Report
More compact version of the Internal Vulnerability Scan Detail report organized by issues. Devices that are affected are listed within an issue. Great for technicians looking to resolve issues, rather than performing remediation on a particular system.
Report shows a layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Additional info is also provided to identify operating systems and device types found.
Same info as in the Layer 2/3 Detail Report in Excel file format. Take data and import it into your favorite Service Desk or PSA, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.