- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow Network Risk Assessment
- play_arrow Network Risk Assessment
- play_arrow Policy Monitor Question Parameters
- play_arrow Searching for Assets in your Network
- play_arrow Policy Monitor Question Backup
- play_arrow Integration with JSA Vulnerability Manager
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Topology models
- play_arrow Reports
- play_arrow Audit Log Data
Viewing Scan Results
The Scan Results page provides the following information:
Parameter | Description |
---|---|
Profile | The name of the scan profile. Hover your mouse over the Profile to display information about the scan profile and the status of the scan. |
Schedule | The run schedule that is applied to the scan profile. If you initiated a manual scan, then Manual is displayed. |
Score | The average Common Vulnerability Scoring System (CVSS) score for the scan. This score helps you prioritize vulnerabilities. |
Hosts | The number of hosts that are found and scanned when the scan profile ran. Click the Host column link to display vulnerability data for the scanned hosts. |
Vulnerabilities | The number of different types of vulnerabilities found by a scan. Click the Vulnerabilities column link to view all unique vulnerabilities. |
Vulnerability Instances | The number of vulnerabilities found by the scan. |
Open Services | The number of unique open services found by the scan. A unique open service is counted as a single open service. Click the Open Services column link to view vulnerabilities categorized by open service. |
Status | The status of the Scan Profile, options include: Stopped - This status is displayed if the scan completed successfully or the scan was canceled. Running - The scan is running. Paused - The scan is paused. Not Started - The scan is not initiated. |
Progress | Specifies the progress of the scan. Hover your mouse over the progress bar while the scan is running to display information about the status of a scan. |
Start Date/Time | The date and time when the scan profile started to run. |
Duration | Displays the time that it took for the scan to complete. |
- Click the Vulnerabilities tab.
- In the navigation pane, click Scan Results.