TOC & Recently Viewed

Recently Viewed Topics

Dashboard Templates

The following dashboard templates are available in Tenable.io.

Executive Summary

Exploitable Framework Analysis

Exploitable by Malware

Measuring Vulnerability Management

Mitigation Summary

Outstanding Remediation Tracking

Prioritize Assets

Security Management Summary

Spectre & Meltdown

Vulnerabilities by Common Ports

Vulnerability Management

Vulnerability Management Overview

Web Services

Dashboard Template Description Included Widgets
Executive Summary

This template brings together key metrics to help executives easily identify and measure cyber risks. Use this template to monitor the current state of your organization's Cyber Exposure initiative. View CVE metrics, vulnerability states, and other high-level metrics identify security gaps or areas that need attention.

  • Vulnerabilities by State
  • Most Prevalent Vulnerabilities Discovered in the Last 14 Days
  • Top 100 Vulnerabilities with Patch Available More than 120 Days
  • Top 100 Most Vulnerable Assets
  • Asset Count by Operating System
  • Vulnerabilities by CVE
Exploitable Framework Analysis

This template provides security analysts with an exploit's source tool and identifies the most common targets. Use this template to identify where exploits may have been imported into various tools and services.  The most common exploit frameworks are free or easy to obtain, making it important to monitor them and make effective plans to reduce risks to your organization.

  • Exploitable by Framework
  • New Exploitable Hosts
  • Top Exploitable Linux Hosts
  • Top Exploitable Windows Hosts
Exploitable by Malware

This template provides security analysts with operational awareness of systems on the network with exploitable vulnerabilities. Malware exploits weaknesses and vulnerabilities that make software or hardware perform actions not originally intended. Use this template to view vulnerabilities actively exploited by malware, helping to reduce risks to your organization and offers prioritization suggestions for which vulnerabilities to remediate first.

  • Vulnerabilities Exploitable by Malware Summary
  • Top 100 Vulnerabilities Exploitable by Malware
  • Exploitable by Framework
  • Top 100 Malware Vulnerable Assets
Measuring Vulnerability Management

This template provides a centralized view that you can use to close your Cyber Exposure gap. Use this template to get a structured approach for modeling and analyzing cyber risks, helping you make better business and technology decisions.

  • Threat and Vulnerability Information Is Received from Security Advisories
  • Enumerating Assets and Software
  • Assets Discovery Process Scan Parameters
  • Vulnerability Scanning and Management
  • Organizational Risk Tolerance Is Determined by Accepted Risks
  • Organizational Risk Tolerance Is Determined by Recast Tracking
Mitigation Summary

This template tracks vulnerabilities as they are fixed and provides a summary of information for outstanding vulnerabilities. Use this template to view current and mitigated vulnerabilities, giving you with an accurate understanding of the health of your organization's network.

  • Vulnerabilities Overview
  • Vulnerability Overview by CVSS
  • Vulnerability Overview by CVE
  • Vulnerability Overview by Operating System
Outstanding Remediation Tracking

This template provides information for the current patch status of systems that use credential scans. Use this template to identify systems with missing patches.

  • Outstanding Remediations - Time since Patch Publication
  • Outstanding Microsoft Remediations - Time since Patch Publication
  • Outstanding Remediations By Device Type
  • End of Life Software Detection
Prioritize Assets

This template helps you prioritize assets for remediation by presenting lists of top assets in specific categories. Use this template to get a comprehensive and integrated view of your network.

  • Top Assets with Exploitable Vulnerabilities
  • Top Assets with Adobe Vulnerabilities
  • Top Assets Running Vulnerable Web Servers
  • Top Assets with Java Vulnerabilities
Security Management Summary

This template helps security managers decipher which vulnerabilities to fix first. Use this template to help problem solve and establish appropriate action plans.

  • Most Common Ports
  • Most Common CVEs
  • Most Common Operating Systems
  • Most Vulnerable Linux Hosts
  • Most Vulnerable Windows Hosts
  • Top MS Bulletins
Spectre & Meltdown

This template provides insight to systems affected by Spectre & Meltdown. Use this template to identify unique side channel vulnerabilities caused by out-of-order execution. Tenable.io provides information on all outstanding patches for each operating system and provides a criticality for each vulnerability found.

  • Spectre & Meltdown - Missing Patches
  • Verizon DBIR - Vulnerabilities with Patches Published Over 1 Year Ago
  • Spectre & Meltdown - Missing Patches by Plugin Family
  • Cyber Essentials Scheme - Vulnerabilities by Patch Published Date
Vulnerabilities by Common Ports

This template provides vulnerability information by common TCP ports and services, alerting analysts to potential vulnerable services. Use this template to assist with remediating service vulnerabilities to improve the security of your network.

  • Vulnerable Assets by Common Ports
  • Common Port Vulnerabilities
  • CVSS Vulnerability Counts Per Port
  • Percentage of Vulnerabilities Based on CVSS and Port
Vulnerability Management

This template provides a high-level overview of your organization's vulnerability management program. Use this template to assist in identifying vulnerabilities, prioritizing remediations, and tracking remediation progress. In addition, this dashboard assists in monitoring your network for sensitive data and data access vulnerabilities.

  • Exploitable Vulnerabilities Indicator
  • Potential Sensitive Information
  • Data Access Vulnerabilities
  • Vulnerabilities Overview
  • Top 100 Most Vulnerable Assets
Vulnerability Management Overview

This template provides your organization with an overview of actionable insights about your vulnerability management. Use this template to view the foundation of the Cyber Exposure process and establish a plan to reduce cyber risk.

  • Critical and High Exploitable
  • Vulnerabilities Future Threats: Not Yet Exploitable Vulnerabilities
  • Vulnerability Age: Managing SLAs
  • Statistics
  • Scan Coverage
Web Services

This template provides insight into the web services environment and associated vulnerabilities. Use this template to identify vulnerabilities on ports, outgoing web service activities, and present web services with known vulnerabilities.

  • Web Server Vulnerabilities by Plugin Family
  • Web Services Vulnerabilities by Port
  • SSL Plugins Indicator
  • Web Services Indicator

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.