IBM Proventia Network Enterprise User Manual - page 168
Chapter 12: Interpreting Scan Results
168
IBM Internet Security Systems
Setting Up a Summary Page for Vulnerability Management
Introduction
The Summary view in the SiteProtector Console acts as a portal to different types of
information available in SiteProtector. You can configure the Summary page to
dynamically display information about scanning and vulnerability management.
Vulnerability
management
options
The following table describes the information portal options related to vulnerability
management:
Portal
Description
Scan Progress
Shows the number of scan jobs currently in progress and provides a link to
the Properties tab for the Site where you can view all command jobs for the
Site.
Ticket Status
Displays the total number of critical, high, medium, and low priority tickets
by status, including the following:
•
New
•
Open
•
In Progress
•
Closed
•
Verified closed
•
Pending System Verification
•
System Verified Still Vulnerable
•
System Verified Success
Vulnerability History
by Day
Displays a bar graph that illustrates the following information:
•
Total number of high priority vulnerabilities by day
•
Total number of medium priority vulnerabilities by day
•
Total number of low priority vulnerabilities by day
•
Total number of all vulnerabilities by day
Vulnerability History
by Month
Displays a bar graph that illustrates the following information:
•
Total number of high priority vulnerabilities for the month
•
Total number of medium priority vulnerabilities for the month
•
Total number of low priority vulnerabilities for the month
•
Total number of all vulnerabilities for the month
Vulnerability History
by Week
Displays a bar graph that illustrates the following information:
•
Total number of high priority vulnerabilities by week
•
Total number of medium priority vulnerabilities by week
•
Total number of low priority vulnerabilities by week
•
Total number of all vulnerabilities by week
Vulnerability
Summary by OS
Lists vulnerabilities for each operating system and provides the following
information for each operating system:
•
Total number of high priority vulnerabilities on the operating system
•
Total number of medium priority vulnerabilities on the operating system
•
Total number of low priority vulnerabilities on the operating system
•
Total number of vulnerabilities in all categories on the operating system
Table 58: Information portals for vulnerability management