Exporting .csv Files
Ryskview allow the user to export comma separated value files (.csv), which the user can use to gain more insight on their systems/assets. csv Files can be exported from the Scan Data page or from any report page.
Dashboard > Scan Data Exports
On the scan data page, users can export all data for all systems listed in the top pane by selecting “Export All Data to Excel” in the top right corner.
Alternatively, users can export a filtered list of data for a specific system by populating the bottom pane and selecting “Export System Data to Excel” in the top right of the bottom pane.
The .csv file has the following headers:
- Vulnerability – Displays the vulnerability ID of the vulnerability
- Name – Name of the vulnerability
- Severity – Low, Medium, High, Critical
- IAVA – IAVA reference code
- Host – Hostname of the asset
- IP – IP of the asset
- Port – Port Number
- Protocol – TCP or UDP
- Plugin Output – Displays the specific vulnerability information found on the asset
- Synopsis – Short Description of vulnerability
- Description – Full Description of vulnerability
- Solution – Possible Resolution to vulnerability
- Status – Display whether the vulnerability is past the due date
- Due Date – Date the vulnerability is due. IF an IAVA, this is the due date of the IAVA. Otherwise, the due date is 30 days from when the vulnerability was imported into Ryskview.
- Rysk Score – Ryskview value of risk based upon many factors associated with the Asset, System, and vulnerability.
- Source – The source of the information
- First Discovered – Date the vulnerability was first seen in a scan of the asset
- Last Observed – The most recent date the vulnerability was seen in a scan of the asset
- Last Update – Date the most recent scan was imported into Ryskview
Report Page Exports
To export .csv files from the Scan Data or POAM Reports page, users filter the Reports to show the data to be exported. Then, when ready, in the top right corner, users will select the “export as…” drop-down menu and click the “csv” button. A .csv file will be generated based on the report and the applied filters the user has selected.
- Control Vulnerability Description – Description of Vulnerability
- Security Control Number (NC/NA controls only) – If the vulnerability has an associated 800-53 security control, it will be displayed here.
- Office/Org – The Office with which the Asset is associated.
- Security Checks – Vulnerability ID number
- Resources Required – The System Administrator
- Dependencies – For POAMs only. If dependencies have been selected in the UI, then they will display here.
- Scheduled Completion Date –
- For POAMs, this is the date the vulnerability is has specified to be remediated.
- For Scan Data, this is the due date of the vulnerability.
- Source Identifying Vulnerability – The source of the information
- Status –
- For POAMs, this will display the current status of the POAM in the workflow (Open, Closed, Remediated, Risk Acceptance Requested, Risk Accepted).
- For Scan Data, this will display the status of the vulnerability (New, Recurring, Past Due).
- Raw Severity – Level of risk of the vulnerability (Low, Medium, High, Critical)
- Severity – Level of risk of the vulnerability in the system (Low, Medium, High, Critical)
- Host – Hostname of the asset
- IP – IP of the asset
- System Name – The System with which the Asset is associated.
- Check Content – If the vulnerability is a STIG, this will display directions to verify compliance.
- Fix Information – Possible Resolution to vulnerability
- Ports – Port Number
- Asset Type – Type of device of the asset
- IAVA – IAVA reference code (if applicable)
- Mitigation – POAMs only. Displays any mitigation statements that have been entered for that POAM
- Task Queue Designation – POAMs only. Displays the User or Group which the POAM is currently assigned.
- Scheduled Completion Date Status – Displays whether the vulnerability is past due based upon the user-entered scheduled completion date
- Title – Title of vulnerability
- First Seen – Date vulnerability was identified on the asset
- Last Seen – Most recent date the vulnerability was scanned on the asset
- Age – Number of days the vulnerability has been on the asset
- Recent Workflow – POAM only. Lists the last two workflow updates to a POAM.
- ISSO – ISSO of the Asset
- System Administrator – System Administrator of the Asset
Most report exported files have the same headers. However, the Scan Data – Uncredentialed Scans report export have the following headers:
- Program Office – The Office with which the Asset is associated.
- System – The System with which the Asset is associated.
- Hostname – Hostname of the asset
- IP Address – IP of the asset
- Asset Type – Type of device of the asset
- Require Credentials – Whether the asset requires a credentialed scan
- Last Seen – Most recent date the Asset was scanned
- Last Credentialed – Most recent date the Asset received a credentialed scan job
- First Seen – Date the Asset was first scanned
- System Administrator – System Administrator of the Asset