Solved

network vulnerability forms

Posted on 2011-03-14
6
297 Views
Last Modified: 2012-05-11
I’ve been browsing the internet for template forms for reporting network vulnerabilities. I see allot of forms for network security incident response but not for vulnerabilities; the difference being a proactive reactive approach to securing your network. One could say "If you’re aware of an vulnerability then just fix it", well yea that’s true but if these problems are the result of someone else who’s not very cooperative then the problem needs to have a paper trail regardless. Does anyone know of a good template out there?
0
Comment
Question by:Roodona
  • 3
  • 3
6 Comments
 
LVL 5

Expert Comment

by:paulqna
ID: 35133388
Are you asking for a software tool that logs suspicious behaviour?

Of do you want a template to fill in similar to filing a report to, lets say for example, an insurance company? One that contains as many usefull fields that can be manually filled in as possible?
0
 

Author Comment

by:Roodona
ID: 35140872
Yea like a pdf or word document where I can fill in the issue and be able to send it as a email to someone. Not looking for a software program just a word or pdf template with blank fields.
0
 
LVL 5

Accepted Solution

by:
paulqna earned 500 total points
ID: 35140949
What about saving this url to html and then convert it to doc or pdf, removing the submit buttons etc...?
0
Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

 

Author Comment

by:Roodona
ID: 35152004
oh man, thats awsome, ty!!!
0
 

Author Closing Comment

by:Roodona
ID: 35152012
perfect exactly with I was looking for THANK YOU!!!
0
 
LVL 5

Expert Comment

by:paulqna
ID: 35152071
You're welcome.
0

Featured Post

Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question