Using Iterators in Reports

Slides:



Advertisements
Similar presentations
3D Tool Examples Dave Breslin Tenable Discussions Forum)
Advertisements

Standardized Threat Indicators Tenable Formatted Indicator Export Adversary Analysis (Pivoting) Private and Community Incident Correlation ThreatConnect.
Connecting Parents to Fulton County Schools
AcqENGIN Functional Review © 2010 M2. All rights reserved.
CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Breaking Kill Chains A “How To” Guide for SecurityCenter.
SecurityCenter Reporting Nessus Scan Report. SecurityCenter Reports For customers who use Nessus for vulnerability scanning and then move to SecurityCenter,
Project Information: Customizing and Printing Lesson 7.
MaxMobile for BlackBerry. MaxMobile for Blackberry  Address Book  Opportunities  Customer Service  Calendar  Hotlist  Preferences  Wireless Synchronization.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
User Responsibility A “How To” Guide for SecurityCenter.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
End of Year Report SecurityCenter. End of Year Report Topics Covered o How to install the End of Year report template o How to modify the report template.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Finding Exploitable Admin Systems A “How To” Guide for SecurityCenter.
XP New Perspectives on Microsoft Access 2002 Tutorial 71 Microsoft Access 2002 Tutorial 7 – Integrating Access With the Web and With Other Programs.
Vulnerability Types And How to Use Them.
CausEffects Page Flows and Screenshots. Page Flow Diagram - Client Login Page Login My Events Add Event Submit Event Info New Event Info Select Auction.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Customizing Microsoft Project
Dynamics GP Testdrive In this test drive, you’ll see how to get to answers without the hassles by using navigation lists in Microsoft Dynamics GP. Dynamics.
Introduction to our On-Line Self Service Center at
Malware Hunter How To Guide for SecurityCenter Continuous View™
Using Windows Firewall and Windows Defender
S ECRETARIAT IDE Web Application/Database You access this secure website by entering the following address:
EndNote Web In the ISI Web of Knowledge.
PowerPoint ® Presentation Chapter 12 Troubleshooting with PLC Software PLC Programming Software Viewing PLC Programs Debugging PLC Programs Force Functions.
South Dakota Library Network MetaLib Management Basics Customizing QuickSets South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
Standardized Threat Indicators Indicator Export Adversary Analysis (Pivoting) Private and Community Incident Correlation ThreatConnect Intelligence Research.
3 rd Party Integration – Paxton Apr, Agenda Solution Partner Introduction Integration Introduction Product Demo Technical Issue Escalation Quick.
Tools Menu and Other Concepts Alerts Event Log SLA Management Search Address Space Search Syslog Download NetIIS Standalone Application.
Using Assets with Dashboards A Guide. About this Guide This guide shows how to create, export, and load a dashboard that requires an asset This guide.
Microsoft Office 2007 Intermediate© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! With Microsoft ® Office 2007 Intermediate Chapter.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Chapter 6: The Repetition Structure
Java Portals and Portlets Submitted By: Rashi Chopra CIS 764 Fall 2007 Rashi Chopra.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team Client: Dr. Joseph Berrios Team Client:
INTRODUCTORY GUIDE TO SURPLUS LINE INFORMATION PORTAL 2.0 (SLIP) CALIFORNIA’S ELECTRONIC FILING SYSTEM THE SURPLUS LINE ASSOCIATION OF CALIFORNIA Quick.
Retina Network Security Scanner
Gold – Crystal Reports Introductory Course Cortex User Group Meeting New Orleans – 2011.
City of Dayton Dayton Open Data Fiscal & Budget Transparency Tool User Guide Powered by.
Chapter 15 I’m on the Inside; You’re on the Outside (Nested Loops) Clearly Visual Basic: Programming with Visual Basic nd Edition.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 8.
Using Find / Update in SecurityCenter Reports A “How To” Guide for SecurityCenter.
1 Chapter 3: Getting Started with Tasks 3.1 Introduction to Task Dialogs 3.2 Creating a Listing Report 3.3 Creating a Frequency Report 3.4 Creating a Two-Way.
Taking advantage of Syllabus Text and Instructor Notes A Help Tutorial Presented by:11.
Adxstudio Portals Training
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Labcheck Next Generation Quick Start Guide Equipment Management.
Customize Your View of Data Training Presentation for Supply Chain Platform: BAE Systems May 2015.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Avon Community School Corporation. INTEGRADE PROPOWERTEACHER  Multi-step functions  Limited in features  Not web-based  Must export grades  Must.
AdisInsight User Guide July 2015
Quick Info Tables: Unsubmitted Transactions Transactions with Alerts
Enumeration.
Course Objectives After completing this course, you should be able to:
 NUUO Nuface v1.0 Train a trainer 2015 October.
Advanced Troubleshooting with Cisco Prime NAM-3: Use Case
Flowserve Distributor Online Store & Portal
SEMS Monthly Training Webinar – April 24, 2014 Compliance Management Part 2a: Consumer Confidence Reporting Presented by Chuck Pugh, Director – Professional.
Flowserve Distributor Online Store & Portal
Get Access to your Online Course Tools
Flowserve Distributor Online Store & Portal
Planning for Institutional Effectiveness PIE Planning & Resources
MassCommClass for Media & Culture 2013 Update 8th Ed. Richard Campbell.
User Guide Employee & Manager
Presentation transcript:

Using Iterators in Reports A “How To” Guide for SecurityCenter

What Is an Iterator? Use an iterator in a SecurityCenter report to define a group of items and step through the items in the group, presenting details on each Like a for-next or while loop in a program Step through a group of IP addresses, vulnera- bilities, ports, event users, or event types Present further details about each in the form of tables and charts

Iterator Example An example “Vulnerabilities Per Host” Report Use an iterator to step through all detected hosts Show host information per host Show a pie chart of the count of active vulnerabilities at each severity level per host Show a table of the top most severe active vulnerabilities per host for (all hosts) { display info display pie chart display table }

Iterator Example Edit Iterator dialog Use plugin 19506 to enumerate hosts, and iterate over the first 10 IP addresses… …displaying, for each IP address, host information…

Iterator Example Edit Pie Chart dialog …and, for each IP address, a pie chart of active vulnerabilities at each severity level…

Iterator Example Edit Table dialog …and, for each IP address, a table of the top 10 most severe active vulnerabilities

Iterator Example Example page of the resulting Vulnerabilities Per Host Report Shows the host information, pie chart, and top vulnerabilities table for an IP address

Iterator Notes Iterators are only available in reports The filter for the iterator defines the set of objects to iterate over; this entire set will be iterated over in the report The report elements within the iterator will be repeated for each object in the iterated set The filters for the report elements within the iterator can further refine what information is displayed for each object in the iterated set

Iterator Notes Iterators can be placed within section and group report elements A section element cannot be placed within an iterator Do not place a group element within an iterator; any elements inside a group that is within an iterator will not display in the report

Iterator Uses Use iterator to show Users per Host Iterate over IPs Display users Example from Daily Host Alerts Report: Users Accessing Hosts

Iterator Uses Use iterator to show Software per Host Iterate over IPs Display OS info Display software info Example from Windows Software Summary

Iterator Uses Use iterator to show Plugin output per Host Iterate over IPs Use iterator to show Plugin output per Host Display vuln info Example from Insider Threat Report

Display vuln info with list of IPs Iterator Uses Iterate over vulns Use iterator to show Hosts per Vulnerability Display vuln info with list of IPs Example from Remediation Instructions Report by Vulnerability

Iterator Uses Use iterator to show Hosts per Vulnerability Iterate over vulns Use iterator to show Hosts per Vulnerability Display IPs Example from PVS Detections Report

Iterator Uses Use iterator to show Hosts per Port Iterate over ports Display IPs Example from TCP Port Report

Iterator Uses Use iterator to show Hosts per User Iterate over users Display IPs Example from Daily Host Alerts Report: Hosts Accessed by Users

Iterators Use an iterator in a SecurityCenter report to define a group of items and step through the items in the group, presenting details on each for (all items) { display details... }

Tenable Customer Support Portal For Questions Contact Tenable Customer Support Portal