The Vulnerability Assessment creates a log when it runs a task, and the Control Manager server logs and stores the results. You can use Vulnerability Assessment to generate reports that compare two logs from the same task.
Viewing comparative reports allows you to ...
see if the task has changed from one occurrence to the next
measure the progress of removing vulnerabilities from your network
see if new vulnerabilities have been introduced to your network
From the Task History screen, click Generate ... to open the Generate Comparative Report screen.
Select the task that you in your report, then click Next >.
Select two logs that you want to use in your report, then click Next >. Information about the task and the logs you selected then appears in a new screen.