Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Scan Investigations

In JSA Vulnerability Manager, you can investigate summary asset and vulnerability data for each scan.

To investigate vulnerability scans, do the following tasks:

  • Build and save complex vulnerability search criteria.

  • Investigate exploitation risk levels at a network, asset, and vulnerability level.

  • Prioritize your vulnerability remediation processes.

You must have the correct license capabilities to perform the following scanning operations. If you need assistance to obtain a new or updated license key, contact your Juniper Customer Support.

Scan Results

You can use the Scan Results page to investigate the following information:

  • The progress of a scan and the scanning tools that are queued and running.

  • The status of a scan. For example, a scan with a status of Stopped indicates that the scan completed successfully or was canceled.

  • The degree of risk that is associated with each completed scan profile. The Score column shows the Common Vulnerability Scoring System (CVSS) score for the completed scan profile. The CVSS base and temporal score are included in the calculation of this score but the CVSS environmental score is not included in this calculation. The CVSS environmental score is incorporated in the Risk Score column that you can view in the Manage Vulnerabilities window.

  • The total number of assets that were found by the scan.

  • The total number of vulnerabilities that were discovered by the completed scan profile.

  • The total number of open services that were discovered by the completed scan profile.

    Note:

    Scan progress can indicate that the scan is 100% complete while the results are still processing. To see if processing is complete, hover over the progress bar.

Vulnerability Counts

The Scan Results page shows Vulnerabilities and Vulnerabilities Instances.

  • The Vulnerabilities column shows the total number of unique vulnerabilities that were discovered on all the scanned assets.

  • When you scan multiple assets, the same vulnerability might be present on different assets. Therefore, the Vulnerability Instances column shows the total number of vulnerabilities that were discovered on all the scanned assets.