The OS Vulnerability action expresses event information about the discovery of vulnerabilities related to operating systems. For UNIX or Linux, use the UNIX Vulnerability action for mapping. For Windows, use the Windows Vulnerability action for mapping. Use this action for other operating systems.
|
Information |
Level |
|---|---|
|
Source - User Information |
Secondary |
|
Source - Host Information |
Secondary |
|
Source - Object Information |
Tertiary |
|
Source - Process Information |
Tertiary |
|
Source - Group Information |
Tertiary |
|
Dest - User Information |
Tertiary |
|
Dest - Host Information |
Primary |
|
Dest - Object Information |
Primary |
|
Dest - Group Information |
Tertiary |
|
Agent - Information |
Primary |
|
Agent - Host Information |
Primary |
|
Event Source - Host Information |
Primary |
|
Event Source - Information |
Tertiary |
|
Event - Information |
Primary |
|
Result - Information |
Primary |
|
Result |
event_result |
event_severity |
|---|---|---|
|
Success |
S |
4 |
| Copyright © 2010 CA. All rights reserved. | Email CA Technologies about this topic |