Vulnerability Assessment reports the results of its assessments according to the security risks to the network. These security risks are based on the number and severity of vulnerabilities of individual computers. You can view the status of individual machines from the Machine Status screen, which provides a quick way to investigate the most important risks to your network and learn how to resolve these risks.
View Machine Details
IP Address and Machine identify the computer that has the vulnerability.
Status: Icons indicate the status of the computer. The status is based on the actions you set when you created the assessment task.
Result: This describes the level of security risk that this computer presents to the network. The number and severity of vulnerabilities on each computer determine the results.
Task Name, Action and Completion date/time describe the task that generated the results that Vulnerability Assessment displays in this window.
View Security Summary
This gives a brief summary of the number and severity of the vulnerabilities on this computer. They are organized according to the damage potential that each vulnerability represents to this computer. Details for these risks are given below.
View Vulnerability Details
Damage Potential: The damage potential is the based on the damage that the vulnerability presents to the machine on which it is located. When there is a high level or number of damage potential on a machine, Vulnerability Assessment shows a high level risk to the network (such as critical or important).
Vulnerability Title: The title gives a brief description of the vulnerability and the possible consequences of having that vulnerability.
Vulnerability Name: The name Vulnerability Assessment uses is an industry standard. This makes it easy to obtain further information on the vulnerability and quickly learn how to resolve it.
Potential Malware: This shows the malware that is known to frequently attack the vulnerability. Malware includes such things as viruses, worms and trojans.
Affected Software: This is a list of software that the vulnerability is known to affect.
CVE/CAN Number. The Common Vulnerability and Exposures number and the Candidate number (a vulnerability pending naming standardization) are alternate identifiers for the vulnerability. This makes it easy to obtain further information on the vulnerability and quickly learn how to resolve it.