Dear Support Team,
We are looking to enhance the usefulness of our vulnerability scanning reports and would appreciate your assistance in achieving this goal. Currently, our reports display the top 50 most vulnerable systems on our website. However, we believe there is room for improvement in the way this information is presented.
As it stands, when we select a specific system, we can see that it has approximately 700 vulnerabilities. Exporting this list to a CSV file and sifting through the descriptions reveals that there may be up to 10 different sources contributing to these vulnerabilities, such as Mozilla Corporation. Additionally, while checking the descriptions, we notice that some vulnerabilities are related to Firefox.
What we find lacking in the current report structure is information regarding the specific application that was checked for vulnerabilities. This omission prevents us from pinpointing the exact source of the vulnerabilities efficiently.
Our desired outcome is to receive a CSV file for each customer, containing the following data fields:
- Computer name
- Name of the last user
- Software manufacturer
- Application name
- Number of critical vulnerabilities
- Number of vulnerabilities 1 level less than critical
- Number of vulnerabilities 2 levels less than critical
- Number of vulnerabilities 3 levels less than critical
-
-
This enhanced report format will allow us to have a more actionable view of the vulnerabilities on each person's computer. With this information, we can prioritize and take the necessary steps to address and resolve the issues promptly.
We appreciate your support in making these improvements to our vulnerability scanning reports, as it will significantly aid our efforts to enhance system security and address vulnerabilities effectively.
Thank you for your assistance.
Sincerely, Oodos