Table 11 – Response time icons
Category
3.6.1
Information
Response time in milliseconds
Fast response
Less than 25ms
Medium response
Between 25ms and 100ms
Slow response
More than 100ms
Vulnerability assessment
Screenshot 20 – The Vulnerability Assessment node
Click on any Vulnerability Assessment node to view the security vulnerabilities identified on the target computer grouped by type and severity as follows:
High Security Vulnerabilities
Low Security Vulnerabilities
Potential vulnerabilities
Missing Service Packs
Missing Patches
High/Med/Low Security vulnerabilities Click on the High Security Vulnerabilities or Low Security Vulnerabilities sub–nodes for a list of weaknesses discovered while auditing a target device. Table 12 below describes these groups:
Agent–less Auditing
Administration and configuration manual 31