- Knowledge base
- Reports
- Templates
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I create a template without the ignored/disabled vulnerabilities?
To create a report without the ignored/disabled vulnerabilities, follow this instruction.
- Login to Security Center.
- Click Reports in the main menu.
- Click Templates.
- Click +Add template > e.g. Network scan.
- Under the headline General settings enter the following:
- Name: the name of the report template, e.g. Monthly executive network scan report template.
- Owner: the owner of the report template.
- Under the headline, Scan results section, choose the scan results you like e.g. Network scan.
- Under the headline, Report source, Choose your target by:
- IPs/Ranges: the source for your scan, it can be specific host or IP ranges.
- Include hosts that: here you include hosts that have all or any of the specific tags that you selected.
- Do not Include hosts that: here you exclude hosts that have all or any of the specific tags that you selected.
- Click headline Display.
- Under the headline Report Sections check the sections you want to include in the report (recommended to include all):
- Report details: details as time, source, and owner.
- Vulnerability overview: an overview of the vulnerability status with the amounts for each severity level, the total number of vulnerabilities, average severity, and overall business risk.
- Vulnerability summary: a summary of all vulnerabilities, their ticket status, and category.
- Vulnerability list: a list with all vulnerabilities, use Group vulnerabilities by to select the grouping you prefer.
- Click headline Filter.
- Under the headline Selective vulnerability reporting enter the following settings:
- Complete: includes all vulnerabilities in the database in the report.
- Custom: includes categories of vulnerabilities and/or specific vulnerabilities in the report.
- Under the headline Included operating systems check the operating systems you want to include in the report.
- In the Vulnerability state under the headline Vulnerability filters enter the following settings:
- Active
- Click OK to save the Template.
- Click Reports in the main menu.
- Click +Add report > e.g. Network scan
- Under the headline General information enter the following:
- Name: the name of the report.
- Report template: select the previously created template.
- Under the headline, Report source: Choose your target by:
- IPs/Ranges: the source for your scan, it can be specific host or IP ranges.
- Include hosts that: here you include hosts that have all or any of the specific tags that you selected.
- Do not Include hosts that: here you exclude hosts that have all or any of the specific tags that you selected.
- Click Run
- Done!