Through this article, you will learn how to access your pentest data.
SUMMARY
Reviewing Pentest Results
What form does a pentest rake on the Portal?A pentest is presented as an aggregate of information:
- a managerial and technical summary, strengths, and the campaign scenario
- the list of vulnerabilities
- the evolution of the score
- the list of action tickets (recommendations)
- the list of assets within the scope
- the list of users with access to the audit
- a file-sharing space
Step 1 : Go to the Audits > My Audits menu and select the audit of interest
The My Audits page provides a summary list of audits accessible to you. (As a Manager, you will have access to all audits within your company, even if you have not been specifically added to the authorized user list.)
This page is located in the Audit menu, under the My Audits submenu.
Step 2 : Access Vulnerabilities in My Audit
After clicking on the audit of interest, you can view vulnerabilities identified by our consultants from the Vulnerabilities tab. This tab allows you to identify and track all vulnerabilities identified by XMCO.
- By clicking on the title of a vulnerability, you will have a more detailed description of the vulnerability, including its severity, exploit complexity, and procedure.
- All vulnerability proofs are stored at the end, in the file repository section.
- Furthermore, each vulnerability is associated with one or more recommendation(s) (corresponding to the action plan, see Step 3)
It is possible to download vulnerabilities in PDF format.
Step 3 : Access the Action Plan for My Audit
After clicking on the audit of interest, you can view the recommendations to apply for correcting vulnerabilities from the Action Plan tab. This tab allows you to track all actions to be taken on your side that have been identified by XMCO.
By clicking on the title of a recommendation, you will have a more detailed description of the recommendation, including its priority, difficulty of correction, or even its impact on the audit score.
Each recommendation can be treated as a "support" ticket: its resolution will enable the certification of vulnerability correction or mitigation in the counter-audit process.
You can modify the status of each ticket as you wish: change its status, the assigned person, add comments, etc.
It is possible to download recommendations in PDF format.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article