System Searches and Results    

beSECURE Summary Results provide basic, aggregated information on the vulnerabilities found during a scan. The search parameters involve the Organization, Scan, Vulnerability Name, Category , Hostname / IP Address, Service and Port, Scan Number, Test ID , Summary, Impact, Solution, Output, Risk, CVSS Score, Vulnerability Age, Reference Search, OS Type, Asset Group, Scan Date, & Vulnerability ID. You can also tick the boxes for: Include Previous Scan Results, Show 'None' Risk, Show Unticketed, Show Ignored, & Return Dynamic Output.

You can search with multiple parameters even in the same field by using a comma. It is possible to change the columns that you see in the results using the columns visibility option.

Searches and results are available to all beSECURE system users.

To access searches and results, click Results > Search in the side navigation pane to open the Vulnerability Search page.

Searching with multiple queries

On the Vulnerability Search page, enter the values in the parameters you want to include in your search. For example, entering values in the Service and Port, Risk, and Vulnerability Age parameters and then clicking Search returns results that include those parameters.

Searching by Hostname/IP Address

  1. On the Vulnerability Search page, click the Organization box to select your organization.

  2. Enter the desired host name or IP address in the Hostname / IP Address box.

    1. To query multiple hostnames or IP addresses in a search, separate each with a comma (for example, 192.168.0.100,192.168.0.200).

    2. To query an exact match for a hostname, follow the name with the dollar sign character ($).

  3. Click Search to perform a search.

Searching by reference

  1. On the Vulnerability Search page, click the Reference Search box and select the desired source.

  2. Enter the string you want to query in the empty box to the right.

  3. Click Search to perform a search.

Searching by vulnerability

  1. Search using one of the following parameters:

    1. Vulnerability Name - A string search (you can write part of the name).

    2. Vulnerability ID - For a specific vulnerability on a specific IP/DNS.

    3. Test ID - For all the places this vulnerability appears

  2. Click Search to perform a search.

Searching by Asset Group

NOTE: Asset Groups must be created by your organization beforehand. See To create an Asset Group under Assets for more information.
  1. On the Vulnerability Search page, click the Asset Group box and select the desired Asset Group.

    NOTE: Searches can only include one Asset Group.
  2. Click Search to perform a search.

Saving a search

  1. After entering the values in the desired parameters, click Saved Search(es) in the upper-right corner of the Vulnerability Search page, and then click Save Current Search.

    1. To overwrite an existing saved search, click the Update an existing Saved Search box.

    2. To create a new saved search, enter the desired name in the Create a new Saved Search box.

  2. Click Save.

NOTE: Once a result of the search is received, you can download a report of these results in different formats e.g. pdf, xml, HTML, CSV.