|ronaldsauve||No webex so why is it showing as insecure?|
|2nd May, 2012 05:04|
User Since: 3rd Apr, 2009
System Score: N/A
|There is no webex on my computer. When I try to "open folder", nothing happens. When I manually go to the address, there is no such address. When I rescan, it still shows as insecure. Why does this show it is insecure if it is not there on my computer?|
|mogs||RE: No webex so why is it showing as insecure?|
|2nd May, 2012 08:15|
User Since: 22nd Apr 2009
System Score: 100%
Providing the following information might help someone to help you :-
Which information should I include when requesting support for the Secunia PSI 2.x and 1.x branches?
For the Secunia PSI 2.x branch, when making support requests on our community forum or directly contacting Secunia PSI community support, please provide the troubleshoot report for the program in question.
In order to generate this report, you can double-click the programs entry on the Scan Results page. A pop-up window will open, and from here you can click "Troubleshoot report".
You can then copy-paste this report using Ctrl+C and Ctrl+V. This report contains information which is necessary for troubleshooting, such as filepaths and detailed metadata on the program being debugged.
For the Secunia PSI 1.x branch, enable the Advanced Interface Mode, expand the program entry, and click "Technical details". You can then copy-paste this information and provide it as a troubleshoot report.
Be sure to inform the community or Secunia support which version of the Secunia PSI you are currently using.
If you are using psi 2,0........Are you saying you've already tried the following method ? :-
Deletion of an entry.
To delete a vulnerable file or folder using PSI 2 :
1. Open psi and go to Scan Results.
2. Alongside the vulnerable prog. is a "+" sign.
Clicking on that will reveal Detected Instances..
3. Below, are two yellow folders. Click the one without a red dot.
It will open Windows Explorer and you will be able to view the vulnerable files/folders.
4. Right click and delete.
Perform a full scan to confirm all in order.
Hope the foregoing is of help........regards........
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.