Este contenido no está disponible en el idioma seleccionado.

Chapter 2. Executive reports


You can download a high-level executive report summarizing the security exposure of your infrastructure. Executive reports are two to three-page PDF files, designed for an executive audience, and include the following information:

On page 1

  • Number of RHEL systems analyzed
  • Number of individual CVEs to which your systems are currently exposed
  • Number of security rules in your infrastructure
  • List of CVEs that have advisories

On page 2

  • Percentage of CVEs by severity (CVSS base score) range
  • Number of CVEs published by 7, 30, and 90 day time frame
  • Top three CVEs in your infrastructure, including security rules and known exploits

On page 3

  • Security rule breakdown by severity
  • Top 3 security rules, including severity and number of exposed systems

2.1. Downloading an executive report

Use the following steps to download an executive report for key stakeholders in your security organization:

Procedure

  1. Navigate to the Security > Vulnerability > Reports tab and log in if necessary.
  2. On the Executive report card, click Download PDF.
  3. Click Save File and click OK.

Verification

  1. Verify that the PDF file is in your Downloads folder or other specified location.

To download an executive report, use the vulnerability service API.

  • Request URL: https://console.redhat.com/api/vulnerability/v1/report/executive
  • Curl:

    curl -X GET "https://console.redhat.com/api/vulnerability/v1/report/executive" -H  "accept: application/vnd.api+json"
    Copy to Clipboard Toggle word wrap
Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat