proVM Demo and Overview

This (5min) video walks you through a high level demonstration of all aspects of the software, including how to import data, create reports, perform trending analysis, editing check data, compliance mapping, creating POA&Ms, etc.

Installing proVM Auditor

A demonstration on the install process of proVM Auditor, including building the database at initial setup.

Use With SQL Express Named Instance

This video demonstrates what configuration changes must be made to SQL Express (Named Instance) for proVM to work properly.

Use With SQL Server on LAN/WAN

proVM Auditor utilizes a SQL database. This video demonstrates how to configure both proVM and the SQL Server for use with a LAN or WAN setup.

Importing Result Files

A demonstration of how to import result files from 3rd party scanners into proVM Auditor.

Creating a Vulnerability Matrix

A demonstration of how to create a VM (the reporting piece of proVM).

Explaining the Vulnerability Matrix

An explanation of the Vulnerability Matrix (VM), the reporting piece of proVM Auditor.

Trending Analysis

A demonstration on how to perform both Session Trending and Historical Trending using proVM Auditor.

Editing the Checks Database

Here we show you how to edit the checks in your database. This enables you to tailor your results for your own environment and build compliance mappings, a very powerful tool!

Known and Filtered Findings

proVM allows the capability to post mitigations to already known findings, and to filter out unwanted findings altogether. A very powerful tool to triage work loads. This video explains both.

Overriding Platform Fingerprinting

Platform identification is typically done via fingerprinting by 3rd party vulnerability scanners. This is not a perfect science, and can clutter up your reports (Vulnerability Matrix, VM). This video demonstrates how to override the fingerprinting done by 3rd party vulnerability scanners with the correct system text.

Creating Plans of Action and Milestones (POA&Ms)

A demonstration on how to create POA&Ms on any findings stored in the database of proVM Auditor. POA&Ms are a DoD requirement.

Re-Creating Previous Vulnerability Matrices

This is a demonstration on how to create previous reports (Vulnerability Matrices; VMs) from any historical session; including search capability and the ability to delete previous session data by session.

Database Settings and Purging the Database

The Database Settings screen allows you to build the database, modify and test the connection string, test the database version, force an update, and probably the most important aspect is purging the database. proVM allows you to choose different aspects to purge. This video will highlight the aspects of database settings, and how to purge the database.