Report Templates
Table 5 describes each Tripwire-defined Report Template. In some cases, Report Templates are similar to report types in Tripwire Enterprise (TE) or Tripwire Suite360 Intelligence Hub (SIH). In addition, this Table indicates the Data Availability in Template Output for each template, which is the amount of time from when a TE version check or IP360 scan finishes and the time when the related data is available in the template's output. For some Report Templates, this data is only made available when a daily system job runs each night to summarize the previous day's results (i.e., Daily System Job).
Report Template |
Type |
This Report Template presents ... |
This Report Template is similar to ... |
Data Availability in Template Output |
---|---|---|---|---|
Application Details |
VM |
... detailed information about assets on which a specified application(s) is installed. |
... the SIH Host Inventory report. |
Up to 4 hours |
Application Inventory |
VM |
... a list of applications running in your environment, along with the number of assets on which each application is installed. |
... the SIH Application Inventory report. |
Four (4) hours |
Asset Details |
VM |
... a list of vulnerabilities and applications identified on a specified asset. In addition, Reports compiled by this template include: Remediation guidance, The IP360 rule and associated 'transcript data,' and The host-configuration data retrieved by the IP360 scan. |
... the SIH Asset Dashboard report. |
Up to 4 hours |
Asset Inventory |
VM |
... a list of all known IP360 assets in your environment. For each asset, this Report Template presents the asset's IP360 Host Score, vulnerability count, and the date of the most recent scan. |
... the SIH Host Inventory report. |
Two (2) hours |
Change Summary |
FIM |
... an overview of changes across your environment to identify areas with relatively high change rates. |
... the TE Change Window report. |
Two (2) hours |
Change Summary by Asset |
FIM |
... a view of which assets have the highest number of element changes in your environment and the highest unauthorized change percentage. |
... the: TE Changes by Node or Group Report, Frequently Changed Nodes Report, and Nodes with Changes Report. |
Two (2) hours |
Change Summary by Rule |
FIM |
... the TE rules that have identified the most element changes in your environment and/or those rules with the highest percentage of unauthorized changes. |
... the TE Changes by Rule or Group report. |
Two (2) hours |
Compliance Detailed Test Results |
SCM |
... the policy test results for specified assets. May be useful for the purposes of an audit or to identify failing policy tests for those assets. In addition, you may review the content of each element. |
... the TE Detailed Test Results Report. |
Two (2) hours |
Compliance Summary |
SCM |
... a high-level overview of your organization's compliance with a specific policy family. |
... the TE Test Result Summary Report. |
Two (2) hours |
Compliance Test Results by Asset |
SCM |
... the percentage of passing policy tests for one or more Assets. |
... the TE Test Result Summary Report. |
Two (2) hours |
Compliance Test Results by Policy |
SCM |
... a summary of policy test results for a specified policy family. Identifies the policies with the lowest percentage of passing policy test results. |
... the TE Test Result Summary Report. |
Two (2) hours |
Compliance Test Results by Test |
SCM |
... a summary of policy test results for a specified policy. Identifies the policy tests with the lowest percentage of passing results. |
... the TE Test Result Summary Report. |
Two (2) hours |
Compliance Trends |
SCM |
... a history of policy-compliance trends for all assets in your environment or a specific group of assets. |
... the TE Compliance History Report. |
Daily System Job |
Connect System Health |
System |
... the last time each Connect Index was updated with new data. |
... no TE or SIH report. |
Real-time |
Detailed Changes by Element |
FIM |
... a detailed view of elements that have changed for a specified asset. This template indicates the type of each change, as well as the last date on which each element was evaluated for change. |
... the TE Detailed Changes report. |
Two (2) hours |
Distinct Scan |
VM |
... host and vulnerability data from specified scans or scans completed within a specified time range. |
... SIH Distinct Audit and Time Frame reports. |
Up to 4 hours |
Elements |
FIM |
... a list of all elements identified by the specified criteria. For each element, the Report Template indicates the time and date when TE most recently version checked the element. In addition, you may review the content of each element. |
... the TE Elements report. |
Two (2) hours |
Host Information |
VM |
... information about which SSL certificates have expired, are about to expire, or are issued by a certificate authority (CA) that may have experienced a data breach. |
... the SIH SSL Certificate CSV report. |
Two (2) hours |
License Usage |
System |
... the amount of data (GB) consumed by your Connect Indexes on each of the past 30 days. |
... no TE or SIH report. |
Daily |
Reference Asset Variance |
FIM |
... a list of all elements that differ between a reference asset and one or more comparison assets. In addition, you may review the content of each element. |
... the TE Reference Node Variance report. |
Two (2) hours |
Security Overview |
SCM and VM |
... a summary of the security state of your environment based on TE policy-compliance data and IP360 vulnerability data. |
... no TE or SIH report. |
Daily System Job |
Tripwire Enterprise Asset Inventory |
Multi |
... the make, model, version, and other related information for each system monitored by Tripwire Enterprise. |
... the TE Device Inventory report. |
Two (2) hours |
Vulnerability Aging |
VM |
... the status, timing, and impact of vulnerability-remediation efforts. |
... the SIH Vulnerability Aging report. |
Two (2) hours |
Vulnerability Details |
VM |
... detailed information about the assets on which one or more specified vulnerabilities have been identified. |
... the Affected Hosts section of the SIH Distinct Audit report. |
Up to 4 hours |
Vulnerability Inventory |
VM |
... a list of all vulnerabilities in your environment, along with the number of assets on which each vulnerability is present. |
... the SIH Vulnerability Inventory report. |
Four (4) hours |
Vulnerability Management Summary |
VM |
... a high-level overview of the risks posed by existing vulnerabilities in your organization's environment. |
... the SIH Executive Dashboard. |
Two (2) hours |
Vulnerability Trends |
VM |
... trend information relating to IP360 scan results. |
... the SIH Executive Dashboard. |
Daily System Job |
Vulnerability Variance |
VM |
... an analysis of the vulnerabilities identified in two groups of Assets over two different time periods. |
... the SIH Vulnerability Variance report. |
Two (2) hours |