TOC & Recently Viewed

Recently Viewed Topics

About Scan Results

After a scan is completed, you can view and export the results of that scan.

To access the results of a scan, on the Scans page, in the table of scans, click a row corresponding to a completed scan. The scan results appear.

Assets

When you access the results of a scan, by default the Assets section appears.

The Assets section includes the Vulnerabilities, Operating System, Device Types, and Authentication charts. The following table describes the charts:

Chart Description
Vulnerabilities The Vulnerabilities chart identifies vulnerabilities found by the scan, broken down by severity level. The severity levels are represented as percentages of the total number of vulnerabilities found. You can click specific sections of the chart to display the percentage for a specific severity level.
Operating Systems The Operating Systems chart lists operating systems that were identified by the scan. Individual operating systems are represented as percentages of the total number of operating systems found. You can click specific sections of the chart to display the percentage for a specific operating system.
Device Types The Device Types chart lists the different devices and platforms that were identified by the scan. Individual device types are represented as percentages of the total number of device types found. You can click specific sections of the chart to display the percentage for a specific device type.
Authentication The Authentication chart lists the authentication methods that were used during the scan. Individual authentication types are represented as percentages of the total number of types found. You can click specific sections of the chart to display the percentage for a specific authentication type.

Additionally, the Assets section includes a table that lists in rows the target assets that were scanned and the vulnerabilities (if any) that were identified. You can click an individual row to view more information about the vulnerabilities identified for that asset.

Vulnerabilities

When you click the Vulnerabilities tab, the Vulnerabilities section appears.

The Current Vulnerabilities boxes display the number of vulnerabilities identified the last time the scan completed, organized by severity level. You can click on a box to view the specific vulnerabilities.

The Vulnerabilities section includes the Exploit Available, Published Over 30 Days Ago, Discovered Using Credentials, and Published Solution Available charts. The following table describes the charts:

Chart Description
Exploit Available The Exploit Available chart displays the number of publicly available exploits target vulnerabilities detected on your assets.
Published Over 30 Days Ago The Published Over 30 Days Ago chart displays the number of vulnerabilities detected on your assets were published over 30 days ago.
Discovered Using Credentials The Discovered Using Credentials chart displays the number of vulnerabilities detected on your assets that were discovered using system credentials.
Published Solutions Available The Published Solutions Available chart displays the number of vulnerabilities detected on your assets that have remediation instructions available.

Additionally, the Vulnerabilities section includes a table of vulnerabilities that were detected during the scan. Each row represents a specific vulnerability, and includes the severity level, the name of the vulnerability, the family, and the number of times the vulnerability was identified. The table is organized first by the level of severity of the vulnerability, and then in order of the number of times a vulnerability was detected. You can click an individual row to view more information about a specific vulnerability.

History

When you click the History tab, the History section appears.

The History section includes a table that lists the scan history. Each row identifies a specific time the scan was launched. The row includes that date and time that the scan was launched, the date and time that the scan ended, and what the status of the scan was when it ended.

Using the table, you can view previous scan results. The scan results that you are currently viewing are identified by the Current tag that appears in the Start Date column. To change to a different iteration of the scan, click on another row. The Current tag appears in that row, and you can then view the Assets and Vulnerabilities sections to review the results of the scan on that date.

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.