- Knowledge Base
- Reports
- Templates
-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
How do I create a System & Network Scanning report template?
To create a network scan report template, follow this instruction.
- log in to Security Center.
- Click Reports in the main menu.
- Click Templates.
- Click +Add template > Network scan.
- Under the headline General settings enter the following:
- Name: the name of the report template, e.g. Monthly executive network scan report template.
- Owner: the owner of the report template.
- Under the headline Scan results section enter the following:
- Report source and type: select the report type you want. Read about Manual and Auto here:
http://support.holmsecurity.com/hc/en-us/articles/213603265 - IPs/Ranges: the source for you scan. Can be specific host or IP ranges. You can add any number of hosts.
- Include hosts that: here you include hosts that have all or any of the specific tags that you enter.
- Do not Include hosts that: here you exclude hosts that have all or any of the specific tags that you enter.
- Report source and type: select the report type you want. Read about Manual and Auto here:
- Click headline Display.
- Under the headline Report Sections check the sections you want to include in the report (recommended to include all):
- Report details: details like time, source and owner.
- Vulnerability overview: an overview of the vulnerability status with the amounts for each severity level, total number of vulnerabilities, average severity and overall business risk.
- Vulnerability summary: a summary of all vulnerabilities, their ticket status and category.
- Vulnerability list: a list with all vulnerabilities, use Group vulnerabilities by to select the grouping you prefer.
- Under the headline Graphics check the sections you want to include in the report (recommended to include all):
- Vulnerabilities by severity over time: only available for Trend report with vulnerability history. Line chart with one line for each severity level over time.
- Vulnerabilities by status: bar chart with vulnerabilities by ticket status.
- Vulnerabilities by severity: bar chart with vulnerabilities by severity level.
- Top 5 vulnerable categories: bar chart with the top 5 vulnerable categories.
- Click headline Filter.
- Under the headline Selective vulnerability reporting enter the following settings:
- Complete: includes all vulnerabilities in the database in the report.
- Custom: includes categories vulnerabilities and/or specific vulnerabilities in the report.
- Under the headline Included operating systems check the operating systems you want to include in the report.
- Under the headline Vulnerability filters check the ticket status you want to include.
- Click OK.
- Done!