View Task Details

Task Details screen displays information about a specific security risk. It provides a list of each machines with that risk. It identifies the machines by name and identifies vulnerabilities that cause risks and the name of the attacks associated with the vulnerabilities. When you click a machine name, the Machine Status screen appears.

Viewing the information combined in these screens enables you to quickly resolve vulnerability risks. First, you can use the Task History to see if there are any new security risks appearing on your network. Next, you can click a particular security risk to open the Task Details screen and see the specific machines that are presenting the risk. Finally, you can click a machine name to open the Machine Status screen and read detailed information about the vulnerabilities on each machine to learn how to resolve the vulnerability.

 

Navigating through the screens

View details about the task

The top part of the screen gives a summary of the task and the actions of that task.

View details about the results

The bottom part of the screen provides more detailed information about the results of the task according to the individual machines.

Status: machines have one of four statuses indicated by icons. - blocked, blocking requested or normal. Blocked machines cannot access the network. Blocking requested machines have blocking pending. Normal machines have normal access to the network.

IP Address: the IP Address of the machine that has the vulnerability.

Machine: the name of the machine that has the vulnerability. When you click the name, the Machine Status screen appears.

Result: the result of the assessment according to the risk level that the machine presents to the network. The security risk is determined by the number and severity of the vulnerabilities the machine has.

Vulnerability name: the machine has this vulnerability. The name gives you a standardized reference if you want to do further research about the vulnerability.

Potential Malware: This shows the malware that is known to frequently attack the vulnerability. Malware includes such things as viruses, worms and trojans.