Report Templates

Table 5 describes each Tripwire-defined Report Template. In some cases, Report Templates are similar to report types in Tripwire Enterprise (TE) or Tripwire Suite360 Intelligence Hub (SIH). In addition, this Table indicates the Data Availability in Template Output for each template, which is the amount of time from when a TE version check or IP360 scan finishes and the time when the related data is available in the template's output. For some Report Templates, this data is only made available when a daily system job runs each night to summarize the previous day's results (i.e., Daily System Job).

Table 5. Tripwire Report Templates

Report Template

Type

This Report Template presents ...

This Report Template is similar to ...

Data Availability in Template Output

Application Details

VM

... detailed information about assets on which a specified application(s) is installed.

... the SIH Host Inventory report.

Up to 4 hours

Application Inventory

VM

... a list of applications running in your environment, along with the number of assets on which each application is installed.

... the SIH Application Inventory report.

Four (4) hours

Asset Details

VM

... a list of vulnerabilities and applications identified on a specified asset. In addition, Reports compiled by this template include: 

Remediation guidance,

The IP360 rule and associated 'transcript data,' and

The host-configuration data retrieved by the IP360 scan.

... the SIH Asset Dashboard report.

Up to 4 hours

Asset Inventory

VM

... a list of all known IP360 assets in your environment. For each asset, this Report Template presents the asset's IP360 Host Score, vulnerability count, and the date of the most recent scan.

... the SIH Host Inventory report.

Two (2) hours

Change Summary

FIM

... an overview of changes across your environment to identify areas with relatively high change rates.

... the TE Change Window report.

Two (2) hours

Change Summary by Asset

FIM

... a view of which assets have the highest number of element changes in your environment and the highest unauthorized change percentage.

... the:

TE Changes by Node or Group Report,

Frequently Changed Nodes Report, and

Nodes with Changes Report.

Two (2) hours

Change Summary by Rule

FIM

... the TE rules that have identified the most element changes in your environment and/or those rules with the highest percentage of unauthorized changes.

... the TE Changes by Rule or Group report.

Two (2) hours

Compliance Detailed Test Results

SCM

... the policy test results for specified assets. May be useful for the purposes of an audit or to identify failing policy tests for those assets. In addition, you may review the content of each element.

... the TE Detailed Test Results Report.

Two (2) hours

Compliance Summary

SCM

... a high-level overview of your organization's compliance with a specific policy family.

... the TE Test Result Summary Report.

Two (2) hours

Compliance Test Results by Asset

SCM

... the percentage of passing policy tests for one or more Assets.

... the TE Test Result Summary Report.

Two (2) hours

Compliance Test Results by Policy

SCM

... a summary of policy test results for a specified policy family. Identifies the policies with the lowest percentage of passing policy test results.

... the TE Test Result Summary Report.

Two (2) hours

Compliance Test Results by Test

SCM

... a summary of policy test results for a specified policy. Identifies the policy tests with the lowest percentage of passing results.

... the TE Test Result Summary Report.

Two (2) hours

Compliance Trends

SCM

... a history of policy-compliance trends for all assets in your environment or a specific group of assets.

... the TE Compliance History Report.

Daily System Job

Connect System Health

System

... the last time each Connect Index was updated with new data.

... no TE or SIH report.

Real-time

Detailed Changes by Element

FIM

... a detailed view of elements that have changed for a specified asset. This template indicates the type of each change, as well as the last date on which each element was evaluated for change.

... the TE Detailed Changes report.

Two (2) hours

Distinct Scan

VM

... host and vulnerability data from specified scans or scans completed within a specified time range.

... SIH Distinct Audit and Time Frame reports.

Up to 4 hours

Elements

FIM

... a list of all elements identified by the specified criteria. For each element, the Report Template indicates the time and date when TE most recently version checked the element. In addition, you may review the content of each element.

... the TE Elements report.

Two (2) hours

Host Information

VM

... information about which SSL certificates have expired, are about to expire, or are issued by a certificate authority (CA) that may have experienced a data breach.

... the SIH SSL Certificate CSV report.

Two (2) hours

License Usage

System

... the amount of data (GB) consumed by your Connect Indexes on each of the past 30 days.

... no TE or SIH report.

Daily

Reference Asset Variance

FIM

... a list of all elements that differ between a reference asset and one or more comparison assets. In addition, you may review the content of each element.

... the TE Reference Node Variance report.

Two (2) hours

Security Overview

SCM and VM

... a summary of the security state of your environment based on TE policy-compliance data and IP360 vulnerability data.

... no TE or SIH report.

Daily System Job

Tripwire Enterprise Asset Inventory

Multi

... the make, model, version, and other related information for each system monitored by Tripwire Enterprise.

... the TE Device Inventory report.

Two (2) hours

Vulnerability Aging

VM

... the status, timing, and impact of vulnerability-remediation efforts.

... the SIH Vulnerability Aging report.

Two (2) hours

Vulnerability Details

VM

... detailed information about the assets on which one or more specified vulnerabilities have been identified.

... the Affected Hosts section of the SIH Distinct Audit report.

Up to 4 hours

Vulnerability Inventory

VM

... a list of all vulnerabilities in your environment, along with the number of assets on which each vulnerability is present.

... the SIH Vulnerability Inventory report.

Four (4) hours

Vulnerability Management Summary

VM

... a high-level overview of the risks posed by existing vulnerabilities in your organization's environment.

... the SIH Executive Dashboard.

Two (2) hours

Vulnerability Trends

VM

... trend information relating to IP360 scan results.

... the SIH Executive Dashboard.

Daily System Job

Vulnerability Variance

VM

... an analysis of the vulnerabilities identified in two groups of Assets over two different time periods.

... the SIH Vulnerability Variance report.

Two (2) hours