Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guida Utente Pagina 40

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 79
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 39
See Also
Filter the results of the discovered vulnerabilities based on the text available in the
“See Also” field of the plugin.
Solution
Filter the results of the discovered vulnerabilities based on text available in the solution
section of the plugin.
STIG Severity
Filter the results of the discovered vulnerabilities based on STIG severity level in the
plugin.
Synopsis
Filter the results of the discovered vulnerabilities based on text available in the
synopsis section of the plugin.
The Hosts tab on the Monitoring page displays a list of the discovered hosts along with a bar chart that is color coded to
indicate the variety of severity levels detected on the host, as well as the total number of each level if there is room to
display it.
Selecting a host from the list will display the vulnerabilities discovered by severity order by default from “Critical” down to
“Informational”. The names of the vulnerability, vulnerability family, and the number discovered will be listed. Selecting any
of these from the list will display vulnerability details including a synopsis, description, solution, plugin information, risk
information, reference information, and affected ports and services for the host. Selecting the “Removebutton will
remove the detected vulnerability from the results.
The Vulnerabilities tab provides a list of the vulnerabilities detected by PVS. The initial sort is by severity level from
“Critical” to “Informational”. The vulnerability names are displayed along with the family and the number of detected
vulnerabilities. Selecting any of these from the list will display vulnerability details including a synopsis, description,
solution, plugin information, risk information, reference information, and affected hosts. Selecting an affected host will
display the ports, plugin information, and affected service as available. Selecting the “Remove” button will remove the
detected vulnerability from the results.
Vedere la pagina 39
1 2 ... 35 36 37 38 39 40 41 42 43 44 45 ... 78 79

Commenti su questo manuale

Nessun commento