Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

EMS Administration Guide

Vulnerability Scan charts and widgets

The Vulnerability Scan dashboard displays a number of pie charts. Each pie chart provides a summary of endpoint information. The sections in each chart are links. You can click any section of the pie charts or any row in the table to display more details.

Chart

Description

Current Vulnerabilities Summary

Displays the following summaries of current vulnerabilities:

  • Total (total number of vulnerabilities)
  • Operating System (number of operating system vulnerabilities)
  • Browser (number of browser vulnerabilities)
  • Microsoft Office (number of Microsoft Office vulnerabilities)
  • Third Party App (number of third-party application vulnerabilities)
  • Service (number of service vulnerabilities)
  • User Config (number of user configuration vulnerabilities)
  • Other (number of other vulnerabilities that do not fit any of the above categories)

When you click a vulnerability tile, the severity of vulnerabilities displays in the colored circles above.

Endpoint Scan Status

Displays the following summaries about endpoints:

  • Vulnerable Endpoints
  • Un-Scanned Endpoints
  • Secured Endpoints
  • Scanning Endpoints

Top 10 Vulnerable Endpoints With High Risk Vulnerabilities

Displays the top ten vulnerable endpoints and the number of high risk vulnerabilities within that endpoint.

Top 10 Vulnerabilities

Displays the top ten vulnerabilities.

Vulnerability Scan charts and widgets

The Vulnerability Scan dashboard displays a number of pie charts. Each pie chart provides a summary of endpoint information. The sections in each chart are links. You can click any section of the pie charts or any row in the table to display more details.

Chart

Description

Current Vulnerabilities Summary

Displays the following summaries of current vulnerabilities:

  • Total (total number of vulnerabilities)
  • Operating System (number of operating system vulnerabilities)
  • Browser (number of browser vulnerabilities)
  • Microsoft Office (number of Microsoft Office vulnerabilities)
  • Third Party App (number of third-party application vulnerabilities)
  • Service (number of service vulnerabilities)
  • User Config (number of user configuration vulnerabilities)
  • Other (number of other vulnerabilities that do not fit any of the above categories)

When you click a vulnerability tile, the severity of vulnerabilities displays in the colored circles above.

Endpoint Scan Status

Displays the following summaries about endpoints:

  • Vulnerable Endpoints
  • Un-Scanned Endpoints
  • Secured Endpoints
  • Scanning Endpoints

Top 10 Vulnerable Endpoints With High Risk Vulnerabilities

Displays the top ten vulnerable endpoints and the number of high risk vulnerabilities within that endpoint.

Top 10 Vulnerabilities

Displays the top ten vulnerabilities.