Checklist Help Information
Checklist are the files that hold all vulnerability information and device metadata for a particular device or host on a particular piece of software or the operating system. For instance, you will have a Windows OS checklist, Windows Firewall checklist, Google Chrome checklist, Internet Explorer checklist and a Microsoft .NET Framework checklist for each Windows-based server in your defined system. The sections below go into further detail to help explain your checklists to you.
Explaining Checklists
This section goes into the checklists as far as the hostname, domain name, IP address and type of checklist. It also shows the vulnerability information and the data you are allowed to add to your checklists. To view more detailed information visit the Explaining Checklists Help.
Add Checklist Wizard
You can use the Checklist Wizard to create new checklists. Specify the hostname, device name or application name. Then walk through the wizard to display relevant checklists and add them to the grouping. Click the Create button at the end to add your new checklists to the system package. To view more detailed information visit the Adding Checklists Help.
Upload Checklists and Compliance Scans
You can upload a CKL / CKLB file you already have or made. You can upload a SCAP scan result file from a DISA benchmark based scan in XCCDF format. You can upload a valid Audit Compliance scan from ACAS/Nessus using a DISA or CIS benchmark. You can upload a Tanium CSV with SCAP results. Or you can also select one or more templates from the Templates area or Create Checklist area to create checklists within your system. To view more detailed information visit the Uploading Checklists Help.
Create Checklists from Templates
You can also create checklists from existing checklist templates. Search the templates by type and check all relevant templates to use. Specify the hostname, device name or application name in the top right above the template table listing. Then Click the Create button to add your new checklists to the system package. To view more detailed information visit the Creating Checklists Help.
Viewing a Checklist
To view a checklist, you click the checklist link in the system checklist listing. Or you can click the ...
menu and choose View from the same listing. This brings up all pertinent information on that checklist with the system. To view more detailed information visit the Viewing Checklists Help.
Checklist Vulnerabilities
The checklist vulnerabilities track possible security related issues and have a status and severity (category) assigned to them. These are the main pieces of data within a checklist and allow you to track each security issue related to a device or host for that particular checklist type, version, and release. To view more detailed information visit the Checklist Vulnerabilities Help.
Checklist Score
Your checklist score is the number of open items by severity/category as well as the number of vulnerabilities marked not a finding, not reviewed, and not applicable. The score is a quick view into the overall status of your checklist. To view more detailed information visit the Checklist Score Help.
Checklist Dashboard
The Checklist Dashboard shows major numbers as far as open vulnerabilities, types of vulnerabilities, and checklist types visually with charts and graphs versus a table view. To view more detailed information visit the System Package Checklist Dashboard Help.
Table of contents
- Explaining Checklists
- Uploading Checklists
- Upload SCAP Scans
- Upload Compliance Scans
- Checklist Wizard
- Create Checklists
- Viewing a Checklist
- Checklist Vulnerabilities
- Checklist Dashboard
- Checklist Score
- Checklist History
- Deleting Checklists