This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of all issues allow a quick survey of the various issues that were detected in an environment.
A comprehensive output including security holes and warnings, and informational items from the Inspector’s point-of-view. The internal vulnerability scan operates behind business firewalls to identify and expose real and potential vulnerabilities inside the network.
Internal Vulnerability Scan Detail by Issue Report
A more compact version of the Internal Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.
This high-level report shows a layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Additional information is also provided to identify which operating systems and device types were found.
The same information as in the Layer 2/3 Detail Report, but in Excel file format. Once in Excel, you’ll be able to take the data and import it into your favorite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.