Task Details screen displays information about a specific security risk. It provides a list of each machines with that risk. It identifies the machines by name and identifies vulnerabilities that cause risks and the name of the attacks associated with the vulnerabilities. When you click a machine name, the Machine Status screen appears.
Viewing the information combined in these screens enables you to quickly resolve vulnerability risks. First, you can use the Task History to see if there are any new security risks appearing on your network. Next, you can click a particular security risk to open the Task Details screen and see the specific machines that are presenting the risk. Finally, you can click a machine name to open the Machine Status screen and read detailed information about the vulnerabilities on each machine to learn how to resolve the vulnerability.
Navigating through the screens
Click Back to close the screen and return to the your previous screen
The number of machines available for viewing is shown in the upper right hand corner, for example 1 - 20 of 48 indicates you are viewing the first 20 logs of a total of 48. Click the right arrows to move to the next page of results and the left arrow to move to the previous page of results. Click the arrows furthest to the right or left, respectively, to move to the end of the list or the beginning of the list.
Click Next>> to view the next page in the series.
To see a specific page, type the page number in the space provided and click Go.
click any underlined number in a table to open a screen with more details.
The top part of the screen gives a summary of the task and the actions of that task.
Task Name: the Task Details screen displays information about this task
Action: states the action (assessment or assessment with enforcement) the administrator set for the task when he or she created it.
Issued by: identifies the person who ran the task
Vulnerability Assessment Pattern File: the number of the pattern file that this task used
Vulnerability Assessment Engine: the engine that Vulnerability Assessment used to complete the task
Completion date/time: states the date and time on which the task finished
View details about the results
The bottom part of the screen provides more detailed information about the results of the task according to the individual machines.
Status: machines have one of four statuses indicated by icons. - blocked, blocking requested or normal. Blocked machines cannot access the network. Blocking requested machines have blocking pending. Normal machines have normal access to the network.
IP Address: the IP Address of the machine that has the vulnerability.
Machine: the name of the machine that has the vulnerability. When you click the name, the Machine Status screen appears.
Result: the result of the assessment according to the risk level that the machine presents to the network. The security risk is determined by the number and severity of the vulnerabilities the machine has.
Vulnerability name: the machine has this vulnerability. The name gives you a standardized reference if you want to do further research about the vulnerability.
Potential Malware: This shows the malware that is known to frequently attack the vulnerability. Malware includes such things as viruses, worms and trojans.