You can view details of all Vulnerability Assessment tasks in the Result Summary screen. You can also view results about Deploy failed, Unsupported and Blocked machines in the Result Summary screen.
The status of the machines is indicated by icons for quick reference. Machines have one of four modes which indicate the enforcement status of the machines: Blocked, Blocking requested, Not blocked or Release requested.
The Result Summary displays all the results according to individual machines and by security risk level. The number and the severity of the vulnerabilities on each machine determines the risk level. You can use this screen to quickly identify the security risk that each machine presents to the network and learn about the vulnerabilities of specific machines. You can also use this screen to learn which machines on your network are Unsupported or Blocked.
Status: The status of the machine is indicated by an icon.
IP Address: the IP Address of the machine that has the vulnerability.
Machine: the name of the machine that has the vulnerability. When you click the name, the Machine Status screen appears.
Result: the result of the assessment according to the risk level that the machine presents to the network. The security risk is determined by the number and severity of the vulnerabilities the machine has.
Vulnerability name: the machine has this vulnerability. The name gives you a standardized reference if you want to do further research about the vulnerability.
Potential Malware: This shows the malware that is known to frequently attack the vulnerability. Malware includes such things as viruses, worms and trojans.
Task Name: the name of the Assessment Task that identified the virus.
Completion Date/Time: the date on which the task that identified the virus ran.
Navigating through the results summary information.
Click Back to close the Results Summary screen and return to the your previous screen
The Results Summary shows the number of tasks available for viewing in the upper right hand corner, for example 1 - 20 of 48 indicates you are viewing the first 20 logs of a total of 48. Click the right arrows to move to the next page of results and the left arrow to move to the previous page of results. Click the arrows furthest to the right or left, respectively, to move to the end of the list or the beginning of the list.
To see a specific page, type the page number in the space provided and click Go.
When you block a machine, Vulnerability Assessment marks the machine for blocking by Network VirusWall. Network VirusWall queries Vulnerability Assessment and blocks all computers for which Vulnerability Assessment requests blocking. The next time that the computer attempts to communicate with the network, Network VirusWall blocks it and prevents it from contacting the network.
To block a machine, do the following:
Select the machines you want to block.
Click Block.
See also
Network VirusWall 1200 Getting Started Guide and Online Help.
When you release a machine, Network VirusWall no longer blocks the computer. It is free to reestablish communications with the network.
To release a machine:
Select the machines you want to release.
Click Release.
Warning! When you manually release the machine, you override all other enforcement policies.
See also
Network VirusWall 1200 Getting Started Guide and Online Help.