Run the Devices with Open Vulnerabilities Report
This chart shows all devices with open vulnerabilities and breaks them down by CAT 1, 2, or 3 severity.
Where the Data Comes From
This data comes from all active checklists in your system package (i.e. you have not deleted them). Each checklist has a list of multiple vulnerabilities and their status as well as Category or Severity. That data is pulled from your checklists and put into the reporting database by vulnerability so reports like this can come back quickly and easily. As vulnerabilities are updated, they are versioned in the checklist database and the final data is parsed and updated in the vulnerability report database.
Why Run this Report
This report shows you what devices have open checklist vulnerabilities, and the count per severity type.