
Administrators can use the History page to generate and save reports. Reports are based on customized queries. The queries gather data from the logs that Vulnerability Assessment has generated when it performed Assessment Tasks. Assessment reports give administrators the ability to better understand assessment tasks and the changing risk factors to network security.
The Vulnerability Assessment History provides the following capabilities:
Create Log Queries Based on Task History
Query results show a history of when a task was performed and the changes to security risks from one task to the next. This provides a useful progress report on whether known vulnerabilities are being reduced.
Create Customized Log Queries
Queries can include many variables such as Task Date, Status, Machine name and Vulnerability name. You can export the query result to a comma-separated values file format.
Generate Comparative Reports
You can select two occurrences of one task to compare in a single report. The query result displays comparative information based on logs and individual machines. You can export the result to a comma-separated values file format.