Recently Viewed Topics
Scan Results
Nessus features rich, flexible, customizable reporting tools.
Using color-coded indicators along with corresponding values, you can quickly assess your scan’s data to help you understand your organization’s health and vulnerabilities.
Navigating Scan Results
Scan reports and dashboard pages are reviewed using common interactive features.
You can:
- Hover over menu, page, or dashboard elements.
- Drill into data by clicking on line items or page elements.
- Use ascending ▲ and descending ▼ sorting controls.
- Navigate between pages using forward > or back < controls.
Steps
- Navigate to the Scans / All Scans page.
- Select the name of the of scan.
OR
- Navigate to the Scans / All Scans page.
- Place a check box next to the name of the scan.
- Use the More drop-down menu, and then select Configure.
Based on permissions and the scan’s actions, you can Configure the scan, search the scan’s Audit Trail, Launch the scan, or Export the scan’s results.
Option | Description |
---|---|
Configure |
Navigates you back to the scan’s configuration settings. |
Audit Trail |
Displays the audit trail dialogue. |
Launch |
Display two choices to launch a scan: Default and Custom.
|
Export |
Allows you to export the scan’s result in one of four formats: Nessus (.nessus), HTML, CSV, or Nessus DB (.db). Nessus DB format is an encrypted, proprietary format, which exports all scan data. A password must be created, and then used when importing the .nessus file type. |
Dashboard
When a scan is configured with Dashboard > Enabled, the scan’s results page defaults to the interactive dashboard view.
Based on the type of scan performed and the type of data collected, the dashboard displays key values and trending indicators.
Dashboard Details
Name | Description |
---|---|
Current Vulnerabilities |
The number of vulnerabilities identified. |
Operating System Comparison |
The percentage of operating systems identified. |
Vulnerability Comparison |
The percentage of all vulnerabilities, identified by severity. |
Host Count Comparison |
The percentage of hosts scanned by credentialed and non-credentialed authorization types: without authorization, new (scan) without authorization, with authorization, and new (scan) with authorization. |
Top Vulnerabilities |
Top 8 vulnerabilities based on severity. |