Use the Vulnerability Assessment History

Administrators can use the History page to generate and save reports. Reports are based on customized queries. The queries gather data from the logs that Vulnerability Assessment has generated when it performed Assessment Tasks. Assessment reports give administrators the ability to better understand assessment tasks and the changing risk factors to network security.

The Vulnerability Assessment History provides the following capabilities:

Query results show a history of when a task was performed and the changes to security risks from one task to the next. This provides a useful progress report on whether  known vulnerabilities are being reduced.

Queries can include many variables such as Task Date, Status, Machine name and Vulnerability name. You can export the query result to a comma-separated values file format.

You can select two occurrences of one task to compare in a single report. The query result displays comparative information based on logs and individual machines. You can export the result to a comma-separated values file format.