You are here: Features > Monitoring Page (PVS)

Monitoring Page

The Monitoring page provides a centralized view of the vulnerabilities discovered by PVS. On this page, vulnerabilities may be viewed in several categories, including dashboards, hosts, vulnerabilities, applications, operating systems, connections, and mobile devices. The results may also be exported in different formats for use in other programs.

Across all of the viewable methods available on the Monitoring page, filter options are available to increase granularity when viewing results. Click the heading of a column to sort items within that section of the Monitoring in ascending or descending order.

The Actions drop-down menu allows you to export results, delete results, or launch a Nessus scan.

Note: After deleting results, you must restart PVS to see the most up-to-date information.

The Filter <section name> box allows for quick filtering based on entered text for the Monitoring page. To view a list of filterable plugin attributes, click the down arrow for any quick filter text field. Results display based on a match of Any or All entered fields. The search field contains example hints when empty, but if an incorrect filter value is entered, the field displays a red border.

Note: The Filter <section name> box is not available in the Dashboards section.

Tip: For instructions on performing the actions available on the Monitoring page, see the related How To section of this guide.

Filter Text

Name Description
Bugtraq ID Filter the results of discovered vulnerabilities based on their Bugtraq identifications.
CPE Filter the results of discovered vulnerabilities based on their CPE identifiers.
CVE Filter the results of discovered vulnerabilities based on their CVE identifiers.
CVSS Base Score Filter the results of discovered vulnerabilities based on the base CVSS score as reported by the vulnerability plugins.
CVSS Temporal Score Filter the results of discovered vulnerabilities based on the temporal CVSS score as reported by the vulnerability plugins.
CVSS Temporal Vector Filter the results of discovered vulnerabilities based on the CVSS temporal vector as reported by the vulnerability plugins.
CVSS Vector Filter the results of discovered vulnerabilities based on the CVSS vector as reported by the vulnerability plugins.
CVSS v3.0 Base Score Filter the results of discovered vulnerabilities based on the CVSS v3.0 base score as reported by the vulnerability plugins.
CVSS v3.0 Temporal Score Filter the results of discovered vulnerabilities based on the temporal CVSS v3.0 score as reported by the vulnerability plugins.
CVSS v3.0 Temporal Vector Filter the results of discovered vulnerabilities based on the temporal CVSS v3.0 vector as reported by the vulnerability plugins.
CVSS v3.0 Vector Filter the results of discovered vulnerabilities based on the CVSS v3.0 vector as reported by the vulnerability plugins.
Host Filter the results of discovered vulnerabilities based on the discovered IP address of the device.
IAVA ID Filter the results of discovered vulnerabilities based on the IAVA IDs of the vulnerabilities.
IAVB ID Filter the results of discovered vulnerabilities based on the IAVB IDs of the vulnerabilities.
IAVT ID Filter the results of discovered vulnerabilities based on the IAVT IDs of the vulnerabilities.
OSVDB ID Filter the results of discovered vulnerabilities based on the discovered OSVDB identifiers.
Plugin Description Filter the results of discovered vulnerabilities based on text available in the descriptions of the vulnerabilities.
Plugin Family Filter the results of discovered vulnerabilities based on a family of discovered vulnerabilities.
Plugin ID Filter the results of discovered vulnerabilities based on the IDs of the plugins that identified the vulnerabilities.
Plugin Name Filter the results of discovered vulnerabilities based on text available in the names of the plugins that identified the vulnerabilities.
Plugin Output Filter the results of discovered vulnerabilities based on text contained in the output of the plugin that discovered the vulnerability.
Port Filter the results of discovered vulnerabilities based on the port the vulnerability was discovered on.
Protocol Filter the results of discovered vulnerabilities based on the detected protocol: tcp, udp, or icmp.
STIG Severity Filter the results of discovered vulnerabilities based on STIG severity level in the plugin.
See Also Filter the results of discovered vulnerabilities based on the text available in the See Also field of the plugin.
Severity Filter the results of discovered vulnerabilities based on the identified severity.
Solution Filter the results of discovered vulnerabilities based on text available in the solution section of the plugin.
Synopsis Filter the results of discovered vulnerabilities based on text available in the synopsis section of the plugin.
System Type Filter the results of discovered vulnerabilities based on the system type of the device.
VLAN ID Filter the results of discovered vulnerabilities based on the VLAN ID of the device.
VXLAN ID Filter the results of discovered vulnerabilities based on the VXLAN ID of the device.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.