Templates

How do I create a System & Network Security report template?

To create a network scan report template, follow this instruction.

  1. Log in to Security Center.
  2. Click Reports in the main menu.
  3. Click Templates.
  4. Click +Add template > Network scan.
  5. Under the headline General settings enter the following:
    • Name: the name of the report template, e.g., Monthly executive network scan report template.
    • Owner: the owner of the report template.
  6. Under the headline Scan results section enter the following:
    • Report source and type: select the report type you want. Read about Manual and Auto here:
      http://support.holmsecurity.com/hc/en-us/articles/213603265
    • IPs/Ranges: the source for your scan. It can be a specific host or IP range. You can add any number of hosts.
    • Include hosts that: here, you include hosts that have all or any of the specific tags that you enter.
    • Do not Include hosts that: here, you exclude hosts that have all or any of the specific tags that you enter.
  7. Click headline Display.
  8. Under the headline Report Sections check the sections you want to include in the report (recommended to include all):
    • Report details: details like time, source and owner.
    • Vulnerability overview: an overview of the vulnerability status with the amounts for each severity level, total number of vulnerabilities, average severity and overall business risk.
    • Vulnerability summary: a summary of all vulnerabilities, their ticket status and category.
    • Vulnerability list: a list with all vulnerabilities; use Group vulnerabilities to select the grouping you prefer.
  9. Under the headline Graphics, check the sections you want to include in the report (recommended to include all):
    • Vulnerabilities by severity over time: only available for Trend report with vulnerability history. Line chart with one line for each severity level over time.
    • Vulnerabilities by status: bar chart with vulnerabilities by ticket status.
    • Vulnerabilities by severity: bar chart with vulnerabilities by severity level.
    • Top 5 vulnerable categories: bar chart with the top 5 vulnerable categories.
  10. Click headline Filter.
  11. Under the headline Selective vulnerability reporting enter the following settings:
    • Complete: includes all vulnerabilities in the database in the report.
    • Custom: includes categories of vulnerabilities and/or specific vulnerabilities in the report.
  12. Under the headline Included operating systems check the operating systems you want to include in the report.
  13. Under the headline Vulnerability filters check the ticket status you want to include.
  14. Click OK.
  15. Done!