You can view the history of a single task from the Task History screen. The Task History lists all the times a task ran since it was created. For each instance of the task, it displays information about the number and type of security risks that the task identified. It also shows information about the number of machines that are subject to enforcement policies or unsupported.
Viewing the information combined in the Task History and Task Detail screens enables you to quickly resolve vulnerability risks. First, you can use the Task History to see if there are any new security risks appearing on your network. Next, you can click a particular security risk to see which specific machines are presenting that risk. Finally, you can click a machine name to read detailed information about the vulnerabilities on each machine to learn how to resolve the vulnerability.
If a mobile machine temporarily attaches to your network you can see it in the Task History.
Choose Run Now to run the task immediately instead of according to its schedule. When you choose Run Now, the Current Tasks screen appears and displays information about the task you selected.
Navigating Through the Screens
Click Back to close the screen and return to the previous screen
The number of machines available for viewing is shown in the upper right hand corner, for example 1 - 20 of 48 indicates you are viewing the first 20 logs of a total of 48. Click the right arrows to move to the next page of results and the left arrow to move to the previous page of results. Click the arrows furthest to the right or left, respectively, to move to the end of the list or the beginning of the list.
Click Next>> to view the next page in the series.
To see a specific page, type the page number in the space provided and click Go.
Click any underlined number in a table to open a screen with more details.
Viewing the Task History Details
You can view the following details about the history of the task.
The Task Name identifies the task that the history is about.
Completion Date/Time: displays the date and time for each completed task
The date and time is sorted in descending order. The task information appears in this window from the most recent instance at the top to the instance that happened the longest time ago at the end.
Assessment Results: the number of machines that present a certain level of security risk to the network. To view additional details about these machines, click the respective number. See also Understanding Assessment Results.
Enforcement: the number of machines for which Vulnerability Assessment has requested blocking. See also Understanding Enforcement.
Unsupported Machines: the number of machines Vulnerability Assessment found to be using incompatible operating system versions. To view additional details about the unsupported machines, click the respective number.
Pattern File Number: the pattern file number used to perform a task