Generating an audit report with security status for all servers
You can generate an audit report that shows the vulnerability status of each runtime in
your inventory in comma-separated value (CSV) format.
Before you begin
You must have a user profile with the View security data permission
or the Manage security data permission. For more information, see Configuring roles and
permissions.
If necessary, open the Security page, as shown in the following
image.
Figure 1. Example Servers page with vulnerability status of servers
If you do not see a listing of servers, either none exist in the inventory, or you have
insufficient permissions. For instructions on registering servers, see Registering a server. For more
information about permissions, see Roles and
permissions.
Click Download audit report.
In the system dialog that opens, you can open or save the audit report to your local
computer.
Open the audit report by using a program capable of viewing CSV files, such as a spreadsheet
editor.
The data looks similar to the following image:Figure 2. Viewing example audit report of security status of servers in CSV format
There is at least one row for each server. If multiple CVEs affect a server, each CVE
occupies one row in the spreadsheet.
Note the column headings:
Runtime Type
Values are jdk (Java™ runtime),
traditional (WebSphere Application Server), or
liberty (WebSphere Application Server Liberty).
WebSphere Version
The version of the Java runtime, WebSphere Application Server, or WebSphere Application Server Liberty.
Hostname
The hostname of the server.
Installation directory
The directory where the server software is installed.
Server
The name of the server.
O/S
The operating system on the server.
Fixes applied
A space-separated list of APARs or the most recent fix pack that are installed on the
server.
Bulletin
The security bulletin number that contains the particular CVE.
Creation time
The date that the security vulnerability was added to the data store in ISO standard
yyyy-MM-dd (UTC time) format. The editor that you import the data into might
convert the date to a different format.
CVE
The ID of the common vulnerability or exposure. If no CVE is listed, the server has no known
vulnerabilities or exposures.
CVSS
The Common Vulnerability Scoring System (CVSS) is a numerical rating of the severity of a
vulnerability, on a scale of 0 (lowest severity) to 10 (highest severity).
Bulletin URL
The URL to the security bulletin for this CVE.
Summary
Additional information that is related to this CVE.