- Knowledge base
- Reports
- Templates
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I create a System & Network Security report template?
To create a network scan report template, follow this instruction.
- Log in to Security Center.
- Click Reports in the main menu.
- Click Templates.
- Click +Add template > Network scan.
- Under the headline General settings enter the following:
- Name: the name of the report template, e.g., Monthly executive network scan report template.
- Owner: the owner of the report template.
- Under the headline Scan results section enter the following:
- Report source and type: select the report type you want. Read about Manual and Auto here:
http://support.holmsecurity.com/hc/en-us/articles/213603265 - IPs/Ranges: the source for your scan. It can be a specific host or IP range. You can add any number of hosts.
- Include hosts that: here, you include hosts that have all or any of the specific tags that you enter.
- Do not Include hosts that: here, you exclude hosts that have all or any of the specific tags that you enter.
- Report source and type: select the report type you want. Read about Manual and Auto here:
- Click headline Display.
- Under the headline Report Sections check the sections you want to include in the report (recommended to include all):
- Report details: details like time, source and owner.
- Vulnerability overview: an overview of the vulnerability status with the amounts for each severity level, total number of vulnerabilities, average severity and overall business risk.
- Vulnerability summary: a summary of all vulnerabilities, their ticket status and category.
- Vulnerability list: a list with all vulnerabilities; use Group vulnerabilities to select the grouping you prefer.
- Under the headline Graphics, check the sections you want to include in the report (recommended to include all):
- Vulnerabilities by severity over time: only available for Trend report with vulnerability history. Line chart with one line for each severity level over time.
- Vulnerabilities by status: bar chart with vulnerabilities by ticket status.
- Vulnerabilities by severity: bar chart with vulnerabilities by severity level.
- Top 5 vulnerable categories: bar chart with the top 5 vulnerable categories.
- Click headline Filter.
- Under the headline Selective vulnerability reporting enter the following settings:
- Complete: includes all vulnerabilities in the database in the report.
- Custom: includes categories of vulnerabilities and/or specific vulnerabilities in the report.
- Under the headline Included operating systems check the operating systems you want to include in the report.
- Under the headline Vulnerability filters check the ticket status you want to include.
- Click OK.
- Done!