From the Task History screen you can generate a comparative report, and this screen shows the results.
This portion of the screen provides statistics about two logs of the same task divided into two columns according to the date and time that each occurrence of the task.
You can view the following details:
Total assessment time. The time that it took to run the task.
Vulnerability assessment engine and the Vulnerability assessment pattern file used to perform the assessment task.
Total machines assessed. The total number of machines the task assessed.
Security risk levels of the machine. The number of machines for each risk level. The risk level is determined by the number and the severity of vulnerabilities on each computer.
Unsupported Machines: the number of machines Vulnerability Assessment found to be using incompatible operating system versions. To view additional details about the task that reported these unsupported machines, click the respective number.
Blocking requested machines The number of machines for which Vulnerability Assessment has requested blocking.
This portion of the screen compares individual machines assessed during the two different occurrences of the task. The first column describes the machine by its IP address, name and latest risk level. The last two columns provide information about the specific vulnerabilities identified during each incidence of the task.
IP Address: the IP Address of the machines included in task.
Machine: the name of the machine that was included in the task.
Latest Risk Level: the result of the assessment according to the risk level that the machine presents to the network. The security risk is determined by the number and severity of the vulnerabilities the machine has.
Vulnerability name: the machine has this vulnerability. The name gives you a standardized reference if you want to do further research about the vulnerability.