Previous Topic: Vulnerability Scan Started ActionNext Topic: Vulnerability Discovery Class


Vulnerability Scan Completed Action

The Vulnerability Scan Completed action deals with the expression of event information pertaining to the completion of a vulnerability scan on a given host or application.

Information

Level

Source - User Information

Secondary

Source - Host Information

Secondary

Source - Object Information

Tertiary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Tertiary

Dest - Host Information

Primary

Dest - Object Information

Primary

Dest - Process Information

Tertiary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

The important information for this action is which vulnerability scan completed on which host. The event information was expressed on which host and recorded by which agent on which host.

Result

event_result

event_severity

Success

S

2

Failure

F

3