Tab | Information Shown |
---|---|
Vulnerabilities | Vulnerabilities related to this asset. |
Alarms | Alarms related to this asset. |
Events | Events related to this asset. |
Software | Software installed on this asset. Use the Edit Software button to add, modify or delete software. |
Services | Services available on this asset. Use the Edit Services button to add, modify or delete services. While in Edit Services, you can enable or disable availability monitoring for the service(s). |
Plugins | Plugins enabled for this asset. Use the Edit Plugins button to enable or disable plugins for this asset. You can enable up to 10 plugins per asset and up to 100 plugins per Sheriff CSM Sensor (Deputy). |
Properties | Properties specified for this asset. Use the Edit Properties button to add, modify or delete properties. |
NetFlow | NetFlow information related to this asset. |
Groups | Asset groups to which the asset belongs. Use the Add to Group button to add or remove the asset from an asset group. |
On the right side of the page, you see a list of Actions to perform on this asset. These consist of
Environment Status | Color | Meaning |
---|---|---|
HIDS | Green | An HIDS agent is deployed on this asset with status Active or Active/Local. |
Yellow | A HIDS agent is deployed on this asset with status Disconnected. | |
Red | A HIDS agent is deployed on this asset with status Never Connected. | |
Gray | No HIDS agent is deployed on this asset. | |
Automatic Asset Discovery | Green | All IP addresses associated with this asset are scheduled to be scanned. |
Yellow | Some IP addresses associated with this asset are scheduled to be scanned. | |
Red | No IP addresses associated with this asset is scheduled to be scanned. | |
Vuln Scan Scheduled | Green | A vulnerability scan has been scheduled for this asset. |
Red | No vulnerability scan has been scheduled for this asset. |
Click HIDS.
This takes you to Environment > Detection > HIDS > Overview, where you see a list of HIDS agents along with their status.
Click Automatic Asset Discovery.
This takes you to Environment > Assets & Groups > Scheduled Scan, where you can schedule an asset discovery scan. See Scheduling an Asset Discovery Scan.
Click Vuln Scan Scheduled.
This takes you to Environment > Vulnerabilities > Scan Jobs, where you see a list of vulnerability scan jobs.
Click See Network Activity.
This takes you to Environment > NetFlow > Details, with the IP address of the asset set as either the source or destination.