#36995 FW: TraceSecurity - Bank of Montana: Vulnerability Assessment Scans Complete
Resolved
2 Normal
Created Jan 20, 2026, 4:41 PM
Resolved Jan 27, 2026, 6:10 PM
System (internal)
Jan 20, 2026, 4:41 PM
Check-in (internal)
Jan 20, 2026, 4:41 PM
Hi Peet, See below email. Do you have 5 minutes to remote into my computer and look at this list with me to see if we need to change the criticality of any please? Thanks, Em EMILIE J. JOHNSTON Chief Operations Officer and Executive Vice President Phone: [406.829.2662](tel:406.829.2662) | Fax: 406.829.2355 [[email protected]](mailto:[email protected]) [www.bankofmontana.com](http://www.bankofmontana.com/) 125 Bank Street, Suite 100 Missoula, MT 59802 NMLS #922126 The information contained in this message is proprietary and/or confidential. If you are not the intended recipient, please: (i) delete the message and all copies; (ii) do not disclose, distribute or use the message in any manner; and (iii) notify the sender immediately. In addition, please be aware that any message addressed to our domain is subject to archiving and review by persons other than the intended recipient. Thank you. From: Colin Cottrell <[email protected]> Sent: Monday, January 19, 2026 11:33 AM To: Emilie Johnston <[email protected]> Cc: Melissa Bordelon <[email protected]> Subject: TraceSecurity - Bank of Montana: Vulnerability Assessment Scans Complete [EXTERNAL - This message was sent from an email outside of Bank of Montana. Please use caution when following links or opening attachments.] Hi Emilie, The scans for your Vulnerability Assessment are complete, and we are now ready to move on to the next phase of the project. In order to do so, you may follow the instructions about classifying your hosts (included below). This process is OPTIONAL but highly encouraged. We allow clients to classify their hosts in TraceInsight Vuln Manager in order to provide information about how critical a device (IP address) is to your organization’s IT infrastructure. By combining this data with the vulnerabilities found on the IP address, we can generate a more accurate portrayal of your network’s health based on the vulnerabilities found on the devices that are most important to you. In general, we give clients three business days to classify nodes, but the sooner you can let us know that you have completed host classification, the sooner we can deliver your report. However, because this is an optional step of the Vulnerability Assessment, you can also choose not to complete host classification, and we will move forward with delivering your report after three business days. To get to your hosts in the application, login into your TraceInsight account and go to: - Vuln Manager module > Hosts page - Click the Set Criticality button on the host you want to classify.Please note that by default, Vuln Manager classifies external devices as Critical and internal devices as Low criticality. - In the new pop-up window, you can modify the criticality of the host. In order to properly classify the node, you should be able to determine how important/vital the node is to your business: · Critical: Devices/hosts that are part of your core operations, or that can be accessed externally, or both. Examples include external firewalls, mail servers, and web servers. · Moderate: Devices/hosts that are part of your network functionality but are only accessible internally and could be replaced or restored without a SEVERE impact to operations. Examples include routers, internal switches, and servers without sensitive data. · Low: Devices/hosts that are part of your network but are only accessible internally and could be replaced with MINIMAL impact to operations. Examples include PCs, laptops, and printers. · Minimal: Devices/hosts that are part of your network but are only accessible internally and could be replaced with minimal to NO impact. Examples include IP phones, network printer servers, and thin clients. Please feel free to consult the Vuln Manager user guide hosted in the app to learn more:https://insight.tracesecurity.com/vuln_manager/docs/hosts/index.html Colin Cottrell Senior Associate Information Security Analyst [embedded image](http://www.tracesecurity.com/) p:225-228-4524
Artichoke Support - Peet (internal)
Jan 20, 2026, 5:57 PM
Done and Done. Cheers.Peet
Ticket Automation (internal)
Jan 27, 2026, 6:10 PM
Automation AutoResolve-Waiting for Customer ran on this ticket. Actions: Change Status to Resolved
| Started | Ended | Hours | Notes |
|---|---|---|---|
| No time entries | |||