Scan Host Summary

The Scan Host Summary report provides a breakdown of vulnerable hosts and vulnerability instances found by the selected scan with asset-level detail. Use this report to help prioritize remediation efforts.

To access the Scan Host Summary report:

  1. In the Alert Logic console, click the menu icon (), and then click Validate.
  2. Click Reports, and then click Vulnerabilities.
  3. Under Scan Schedule Breakdown, click VIEW.
  4. Click Scan Host Summary.

View the report

To view the report, you must select a single value for Customer Account, Deployment Name, Scan Schedule Name, and Scan Start Date.

The Start Scan Time for a specific scan will not appear until the data refresh following the final scan window defined in the schedule. To validate the most recent data refresh, see the Last Updated Time in the top right of the report window.

Filter the report

To refine your findings, filter your report by Category.

Filter the report using drop-down menus

By default, Alert Logic includes (All) filter values in the report.

To add or remove filter values:

  1. Click the drop-down menu in the filter, and then select or clear values.
  2. Click Apply.

Download the report

You can download the Scan Host Summary report as an image, data (CSV), crosstab, PDF, or PowerPoint file. To learn how to download reports, see Report Download Option.

Schedule the report

After you finish setting up the report, you can use SCHEDULE THIS REPORT to run it periodically and subscribe users or an integration (such as a webhook) to receive a notification when the report is generated. To learn how to schedule the report and subscribe notification recipients, see Scheduled Reports and Notifications.

Scan result categories

If the selected deployment has agent-based scanning enabled, Alert Logic consolidates agent-based scan results with the latest available internal network scan to provide a complete vulnerability assessment. You can use the Category filter to isolate vulnerability assessments in consolidated results. Listed categories include the vulnerability scan type(s) associated with the selected schedule:

Category Vulnerability Scan Type
Agent Agent-based scan
Credentials Internal network scan with credentials (authenticated)
Network Internal network scan without credentials (unauthenticated)
External External network scan

For information about each scan type, see About Alert Logic Scans.

In the Category filter list, if you see only Non-Attributable, it indicates that the selected scan did not detect any vulnerabilities.

CVSS scores and severity

Alert Logic assigns each vulnerability instance with a severity rating based on the CVSS score set by the National Institute of Standards and Technology (NIST) and reported to the National Vulnerability Database. Alert Logic supports both CVSS v2 and CVSS v3 scores.

Severity rating CVSS v2 score range CVSS v3 score range
Critical Not applicable 9.0 - 10.0
High 7.0 - 10.0 7.0 - 8.9
Medium 4.0 - 6.9 4.0 - 6.9
Low 0.1 - 3.9 0.1 - 3.9
Informational 0.0 0.0

Some vulnerabilities in the National Vulnerability Database have both CVSS v2 and CVSS v3 scores. Alert Logic displays the newer CVSS v3 score and severity rating in prominent locations and both scores in detail views. If only one CVSS score exists, Alert Logic uses that score and severity rating.

Vulnerable Hosts section

This section provides the total number of hosts with vulnerabilities found by the selected scan.

Vulnerability Instances section

This section provides the total number of vulnerability instances found by the selected scan.

Vulnerability Severities section

This section provides the vulnerability count and percentages in each CVSS severity category found by the selected scan.

Top 10 Vulnerable Hosts by Vulnerability Count section

The list provides the top 10 vulnerable hosts by total vulnerability count found by the selected scan. The list is organized by host name, IP address, vulnerability count, and a bar graph that represents the relative count of vulnerabilities by IP address. Hover the bar graph to see the relative percentage of vulnerabilities for each IP address.

Top 10 Vulnerable Hosts by High Severity section

The list displays the current top 10 vulnerable hosts based on the count of critical and high severity vulnerabilities found by the selected scan. The list is organized by host name, IP address, critical and high severity vulnerability count, and a bar graph that represents the relative count of critical and high severity vulnerabilities by IP address. Hover the bar graph to see the relative percentage of critical and high severity vulnerabilities for each IP address.

Scanned Host Summary Details section

The list provides the breakdown of vulnerable hosts by vulnerability severity found by the selected scan. The list is organized by IP address, host name, vulnerability, protocol/port, CVSS score, and the severity of the vulnerability. You can hover the severity bar to see a tooltip with additional details about the vulnerability.