Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

network vulnerability forms

Posted on 2011-03-14
6
Medium Priority
?
318 Views
Last Modified: 2012-05-11
I’ve been browsing the internet for template forms for reporting network vulnerabilities. I see allot of forms for network security incident response but not for vulnerabilities; the difference being a proactive reactive approach to securing your network. One could say "If you’re aware of an vulnerability then just fix it", well yea that’s true but if these problems are the result of someone else who’s not very cooperative then the problem needs to have a paper trail regardless. Does anyone know of a good template out there?
0
Comment
Question by:Roodona
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 5

Expert Comment

by:paulqna
ID: 35133388
Are you asking for a software tool that logs suspicious behaviour?

Of do you want a template to fill in similar to filing a report to, lets say for example, an insurance company? One that contains as many usefull fields that can be manually filled in as possible?
0
 

Author Comment

by:Roodona
ID: 35140872
Yea like a pdf or word document where I can fill in the issue and be able to send it as a email to someone. Not looking for a software program just a word or pdf template with blank fields.
0
 
LVL 5

Accepted Solution

by:
paulqna earned 2000 total points
ID: 35140949
What about saving this url to html and then convert it to doc or pdf, removing the submit buttons etc...?
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 

Author Comment

by:Roodona
ID: 35152004
oh man, thats awsome, ty!!!
0
 

Author Closing Comment

by:Roodona
ID: 35152012
perfect exactly with I was looking for THANK YOU!!!
0
 
LVL 5

Expert Comment

by:paulqna
ID: 35152071
You're welcome.
0

Featured Post

Protect Your Retail Business and Reputation

Wi-Fi access doesn't just impact your business & customer experience, it can also affect your security.  Join us for an informative webinar to learn more about the top threats and trends impacting retail today, and the key solutions to protecting retail networks and reputations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

671 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question