Monitoring Page
The Monitoring page provides a centralized view of vulnerabilities discovered by Tenable Nessus Network Monitor. On this page, vulnerabilities may be viewed in several categories, including Dashboards, Hosts, Vulnerabilities, Applications, Operating Systems, Connections, and Mobile Devices. The results may also be exported in different formats for use in other programs.
Across all of the viewable methods available on the Monitoring page, filter options are available to increase granularity when viewing results. Click the heading of a column to sort items within that section of the Monitoring page in ascending or descending order.
The Actions drop-down box allows you to export results, delete results, or launch a Tenable Nessus scan.
Note: After deleting results, you must restart Tenable Nessus Network Monitor to see the most up-to-date information.
The Filter <section name> box allows for quick filtering of the Monitoring page. To view a list of filterable plugin attributes, click the down arrow for any quick filter box. Results appear based on a match of Any or All filters. The search box contains example hints when empty, but if an incorrect filter value is introduced, the box displays a red border.
Note: The Filter <section name> box is not available in the Dashboards section.
Filter Text
Name |
Description |
---|---|
Bugtraq ID |
Filter the results of discovered vulnerabilities based on their Bugtraq identifications. |
CPE |
Filter the results of discovered vulnerabilities based on their CPE identifiers. |
CVE |
Filter the results of discovered vulnerabilities based on their CVE identifiers. |
CVSS Base Score |
Filter the results of discovered vulnerabilities based on the base CVSS score as reported by vulnerability plugins. |
CVSS Temporal Score |
Filter the results of discovered vulnerabilities based on the temporal CVSS score as reported by vulnerability plugins. |
CVSS Temporal Vector |
Filter the results of discovered vulnerabilities based on the CVSS temporal vector as reported by vulnerability plugins. |
CVSS Vector |
Filter the results of discovered vulnerabilities based on the CVSS vector as reported by vulnerability plugins. |
CVSS v3.0 Base Score |
Filter the results of discovered vulnerabilities based on the CVSS v3.0 base score as reported by vulnerability plugins. |
CVSS v3.0 Temporal Score |
Filter the results of discovered vulnerabilities based on the temporal CVSS v3.0 score as reported by vulnerability plugins. |
CVSS v3.0 Temporal Vector |
Filter the results of discovered vulnerabilities based on the temporal CVSS v3.0 vector as reported by vulnerability plugins. |
CVSS v3.0 Vector |
Filter the results of discovered vulnerabilities based on the CVSS v3.0 vector as reported by vulnerability plugins. |
Host |
Filter the results of discovered vulnerabilities based on the discovered IP address of the device. |
IAVA ID |
Filter the results of discovered vulnerabilities based on the IAVA IDs of the vulnerabilities. |
IAVB ID |
Filter the results of discovered vulnerabilities based on the IAVB IDs of the vulnerabilities. |
IAVT ID |
Filter the results of discovered vulnerabilities based on the IAVT IDs of the vulnerabilities. |
OSVDB ID |
Filter the results of discovered vulnerabilities based on the discovered OSVDB identifiers. |
Plugin Description |
Filter the results of discovered vulnerabilities based on text available in the descriptions of the vulnerabilities. |
Plugin Family |
Filter the results of discovered vulnerabilities based on a family of discovered vulnerabilities. |
Plugin ID |
Filter the results of discovered vulnerabilities based on the IDs of the plugins that identified the vulnerabilities. |
Plugin Name |
Filter the results of discovered vulnerabilities based on text available in the names of the plugins that identified the vulnerabilities. |
Plugin Output |
Filter the results of discovered vulnerabilities based on text contained in the output of the plugin that discovered the vulnerability. |
Port |
Filter the results of discovered vulnerabilities based on the port on which the vulnerability was discovered. |
Protocol |
Filter the results of discovered vulnerabilities based on the detected protocol: tcp, udp, or icmp. |
STIG Severity |
Filter the results of discovered vulnerabilities based on STIG severity level of the plugin. |
See Also |
Filter the results of discovered vulnerabilities based on the text available in the See Also box of the plugin. |
Severity |
Filter the results of discovered vulnerabilities based on the identified severity. |
Solution |
Filter the results of discovered vulnerabilities based on text available in the solution section of the plugin. |
Synopsis |
Filter the results of discovered vulnerabilities based on text available in the synopsis section of the plugin. |
System Type |
Filter the results of discovered vulnerabilities based on the system type of the device. |
VLAN ID |
Filter the results of discovered vulnerabilities based on the VLAN ID of the device. |