Recently Viewed Topics
About Scan Results
After a scan completes, you can view and export the results of that scan.
To access the results of a scan, on the Scans page, click the row of a completed scan in the table of scans. The scan results appear.
When you access the results of a scan, the Assets section appears by default.
The Assets section includes the Vulnerabilities, Operating System, Device Types, and Authentication charts. The following table describes the charts:
|Vulnerabilities||The Vulnerabilities chart identifies vulnerabilities found by the scan, broken down by severity level. The severity levels are represented as percentages of the total number of vulnerabilities found. You can click specific sections of the chart to display the percentage for a specific severity level.|
|Operating Systems||The Operating Systems chart lists operating systems identified by the scan. Individual operating systems are represented as percentages of the total number of operating systems found. You can click specific sections of the chart to display the percentage for a specific operating system.|
|Device Types||The Device Types chart lists the different devices and platforms identified by the scan. Individual device types are represented as percentages of the total number of device types found. You can click specific sections of the chart to display the percentage for a specific device type.|
|Authentication||The Authentication chart lists the authentication methods used during the scan. Individual authentication types are represented as percentages of the total number of types found. You can click specific sections of the chart to display the percentage for a specific authentication type.|
Additionally, the Assets section includes a table that lists in rows the target assets that were scanned and the vulnerabilities (if any) that were identified. You can click an individual row to view more information about the vulnerabilities identified for that asset.
When you click the Vulnerabilities tab, the Vulnerabilities section appears.
The Current Vulnerabilities boxes display the number of vulnerabilities identified the last time the scan completed, organized by severity level. You can click on a box to view the specific vulnerabilities.
The Vulnerabilities section includes the Exploit Available, Published Over 30 Days Ago, Discovered Using Credentials, and Published Solution Available charts. The following table describes the charts:
|Exploit Available||The Exploit Available chart displays the number of publicly available exploits target vulnerabilities detected on your assets.|
|Published Over 30 Days Ago||The Published Over 30 Days Ago chart displays the number of vulnerabilities detected on your assets that were published over 30 days ago.|
|Discovered Using Credentials||The Discovered Using Credentials chart displays the number of vulnerabilities detected on your assets that were discovered using system credentials.|
|Published Solutions Available||The Published Solutions Available chart displays the number of vulnerabilities detected on your assets that have remediation instructions available.|
Additionally, the Vulnerabilities section includes a table of vulnerabilities that were detected during the scan. Each row represents a specific vulnerability, and includes the severity level, the name of the vulnerability, the family, and the number of times the vulnerability was identified. The table is organized first by the level of severity of the vulnerability, and then in order of the number of times a vulnerability was detected. You can click an individual row to view more information about a specific vulnerability.
When you click the History tab, the History section appears.
The History section includes a table that lists the scan history. Each row represents a specific instance the scan launched. The row includes that date and time that the scan launched, the date and time the scan ended, and the status of the scan when it ended.
Using the table, you can view previous scan results. The scan results that you are currently viewing are identified by the Current tag that appears in the Start Date column. To change to a different iteration of the scan, click on another row. The Current tag appears in that row, and you can then view the Assets and Vulnerabilities sections to review the results of the scan on that date.