McAfee MTP08EMB3RUA Product Guide - Page 156

How detections are reported, Viewing scan results, Reports, View HTML, Networks, Alerts, Scans

Page 156 highlights

9 Using Vulnerability Scanning How detections are reported How detections are reported After scanning is completed, detailed server fingerprints, open ports, and vulnerability data are available on the vulnerability scanning portal. When audit scans discover vulnerabilities, you receive an email alert (if you have configured this option) directing you to visit the portal. There you can view scan results, detailed patch recommendations applicable to your specific system configuration, historical audit data, and printable audit reports. Scan results are reported in several different ways. This type of report Shows Audit Report Results for audit scans run on IP addresses. To view: Under Audits, select Reports, select the type of report and the devices to include, then click View HTML. (A PDF version is also available.) Change Report Results for network discovery scans, including comparison to the previous scan. To view: Under Discovery, select Networks, then select Reports. DNS Discovery Scan Results for DNS discovery scans of domains. Result To view: Under Discovery, select DNS, select a domain that has been scanned, then select links within the report to display details. Security Alerts All vulnerabilities in your account detected by all types of scans. To view: Under Security, select Alerts, then select links in the listing to display details. Security Scans All scans set up for your account. To view: Under Security, select Scans, then select any device name to display details. Vulnerabilities All vulnerabilities detected on IP addresses and domains, sorted by severity rating. To view: Under Audits, select Vulnerabilities, then select the name of a vulnerability to display details about it and options for remediation. Viewing scan results Use these tasks to view the results of vulnerability scans. 156 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

How detections are reported
After scanning is completed, detailed server fingerprints, open ports, and vulnerability data are
available on the vulnerability scanning portal.
When audit scans discover vulnerabilities, you receive an email alert (if you have configured this
option) directing you to visit the portal. There you can view scan results, detailed patch
recommendations applicable to your specific system configuration, historical audit data, and printable
audit reports.
Scan results are reported in several different ways.
This type of report
Shows
Audit Report
Results for audit scans run on IP addresses.
To view:
Under Audits, select
Reports
, select the type of report and the devices
to include, then click
View HTML
. (A PDF version is also available.)
Change Report
Results for network discovery scans, including comparison to the previous scan.
To view:
Under Discovery, select
Networks
, then select
Reports
.
DNS Discovery Scan
Result
Results for DNS discovery scans of domains.
To view:
Under Discovery, select
DNS
, select a domain that has been scanned,
then select links within the report to display details.
Security Alerts
All vulnerabilities in your account detected by all types of scans.
To view:
Under Security, select
Alerts
, then select links in the listing to display
details.
Security Scans
All scans set up for your account.
To view:
Under Security, select
Scans
, then select any device name to display
details.
Vulnerabilities
All vulnerabilities detected on IP addresses and domains, sorted by severity
rating.
To view:
Under Audits, select
Vulnerabilities
, then select the name of a
vulnerability to display details about it and options for remediation.
Viewing scan results
Use these tasks to view the results of vulnerability scans.
9
Using Vulnerability Scanning
How detections are reported
156
McAfee Total Protection Service 5.1.5 Product Guide