Assessment report can be presented to the customer with a summary of their overall risk score based on the latest scan, along with simple charts & pointers to highlight the problem areas.
Consolidated Summary - The PPT report showcases the Vulnerability Overview which contains the Vulnerability Breakdown, Grade of the Company, External Vulnerabilities, Vulnerability Breakdown Across OS, and Top Critical Assets.
Risk Score Grade - Selected Company’s grade is based on the average risk score across all sites.
Vulnerability Breakdown - This section showcases the Vulnerability Breakdown Across Operating Systems which shows all of the operating systems with the severity are Critical, High, Medium, and Low. The raw data of this report can be seen in the Consolidated Summary Docx report.
Consolidated Summary Report - The DOC report showcases the Executive Summary which includes the Asset Summary, Vulnerability Summary, Active Directory Summary, OverAll Company Grade, Vulnerability Summary with the count, Network Scan Assessment, Operating System Breakdown, The three dangers of the unsupported operating systems, OverAll Vulnerability Summary, Pending Remediation Summary, Active Directory Non - Compliance, and Active Directory Best Practices for User Accounts.
Executive Summary Report - The DOC report showcases the Executive Summary which includes the Asset Summary, Vulnerability Summary, Active Directory Summary, OverAll Company Grade, What is a security risk assessment?, How does a security risk assessment work?, Asset Summary, Your Asset Assessment, Operating System Breakdown, The three dangers of the unsupported operating systems, Vendor Asset Count, Endpoint Assessment which includes Network Scan Assessment, OverAll Vulnerability Summary, Vulnerability Summary By OS, Active Directory Assessment, and Active Directory Best Practices for User Accounts.
Security Summary Report - The DOC report showcases the Executive Summary which includes the Assets, Vulnerabilities across 67 assets, remediation, Application Baseline, Ports, Active Directory computers, Active Directory Users, Active Directory GPOs, and Active Directory Groups. The Security Summary includes the Security Summary, Compliance Summary, Security Report Card, OS Breakdown, Vendor Breakdown, Storage Devices by Disk Space, and Storage Devices by Encryption.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article