This online patch report summary shows: 961 total patches need to be applied to fix the vulnerabilities on the target hosts, 174 hosts require patches to be applied in order to fix the vulnerabilities, and 1,345 vulnerabilities in the user's account are addressed in the report.
(1) To view the target asset groups and/or IPs: Click "View Report Targets".
(2) To view the hosts for a particular asset group: Click the asset group title.
(3) To sort the HOSTS list by a host attribute: Click a host attribute (column title) in the HOSTS list. The arrow next to the column title indicates the sort order: ascending (Up arrow) or descending (Down arrow). Click the column title again to toggle the sort order.
(4) To view the missing patches for a particular host: Move your mouse pointer over a host in the HOSTS list and click the host row. The missing patches for the host appear in the PATCHES list (on the right). In the PATCHES header you'll see the number of missing patches for the selected host. In this case, there are 13 missing patches for the host 10.10.24.47.
(5) To page through the HOSTS list: Use the arrow keys (under the list area) to page forward and backward through the list. Enter a number in the field provided to jump to a certain page number.
(6) To apply a filter to the HOSTS list: Enter a string in the Filter field (under the list area). The HOSTS list will be updated to display only hosts with attributes matching the string you enter. For example, if you enter "10.10.25.6" the report will display only IP addresses including that string.
(7) To read the vendor's security bulletin related to a patch: Click the vendor ID link for a patch in the PATCHES list.
(8) To view the vulnerabilities that will be fixed after applying a patch on a host: Refer to the Vulns column for a patch in the PATCHES list. If “QIDs that will be fixed by each patch” is selected in the patch template used to generate the report, click the number of vulnerabilities link to view a list of vulnerabilities which the patch will fix. You'll notice instance data for the detection if applicable, and the age of the detection. If you click the QID, you will see the vulnerability information from the KnowledgeBase.