Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Unsupported OS Report

by Megan Daudelin
December 15, 2015

Unsupported OS Report Screenshot

Detecting unsupported operating systems on a network can be a daunting task. Understanding which operating systems are unsupported or approaching end-of-life (EOL) can improve a security team’s ability to mitigate vulnerabilities and secure the network. Systems running unsupported operating systems are more vulnerable to exploitation, so identifying and upgrading unsupported operating systems on a network is essential to an effective security program. By leveraging the capabilities of Tenable.sc and Nessus, security teams can easily identify and address unsupported operating systems on a network.

The Unsupported OS Report assists security teams in identifying the operating systems that are unsupported so that security initiatives can be focused accordingly. Nessus plugins are used to gather data about systems running unsupported operating systems. Systems are filtered by plugin name and vulnerability text in order to detect unsupported operating systems. This report provides detailed information about systems running unsupported operating systems on an organization’s network.

The chapters in this report provide detailed information about the unsupported operating systems detected by Nessus on the network. Components filter by plugin name and vulnerability text in order to provide the most accurate overview of unsupported operating systems. A list of detailed information provides insight into systems running unsupported operating systems and recommended steps to address the vulnerability. Security teams can use the data in this report to detect and upgrade unsupported operating systems.

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards and assets. This report can be easily located in the Tenable.sc Feed under the category Compliance & Configuration. The report requirements are:

  • Tenable.sc 4.8.2
  • Nessus 6.5.3

Tenable.sc Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. By integrating with Nessus and an organization’s MDM solution, Tenable.sc CV provides the most comprehensive view of network security data.

This report contains the following chapters:

  • Executive Summary: This chapter provides an overview of the operating systems detected on the network and the types of unsupported operating systems discovered.
  • Unsupported Operating Systems: The Unsupported Operating Systems table lists detailed vulnerability information about each unsupported operating system detected in the network.
  • Host Details: This chapter contains an iterator that provides detailed information about each instance of unsupported operating systems detected on the network.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now