Skip to content

Asset focus

This area lists all zones, products, and assets from the inventory for which at least one vulnerability is known. Assets that are free of vulnerabilities are not displayed.

You can display all vulnerabilities of the selected asset and define appropriate tasks.

Zone overview

This area lists the zones affected by vulnerabilities ② and shows how they are affected ⑤. Clicking on a zone opens the 'Assets list'.

You can filter zones ① or adjust the sorting of zones ③.

Additional information is provided for each zone (④-⑦).

none

Number Description
Input field for filtering the zones
List of zones
Sort button

none

Number Description
Zone name
Distribution of the individual risk levels over all of the affected assets; see color bar for risk level.
Number of assets in this zone affected by at least one vulnerability.
Ratio between [the total number of assets in this zone] and [the number of affected assets in this zone]; at '100%', every asset contained in the zone is affected by at least one vulnerability.

Asset list for zones

This area shows information about the selected zone as well as all products and assets in the inventory that are part of the zone and affected by at least one vulnerability.

Clicking the button ① takes you back to the 'Zone overview'.

The zone details ② show important information about the zone.

The list of products ③ shows products that contain at least one asset that is in the zone and is affected by a vulnerability. Clicking on it displays all affected assets ④. Details can be displayed for a selected asset ⑥.

After you select an asset and then navigate to the 'Threats and tasks' area ⑥, all vulnerabilities of the selected asset can be viewed and appropriate tasks can be defined. For each affected asset, the greatest risk level due to the currently pending vulnerabilities ⑦ is shown. It also shows how many of these pending vulnerabilities are still in the 'Open' status, and what the highest risk level of the open vulnerabilities is ⑩.

none

Number Description
Name of the selected zone and navigation back to the 'Zone overview'
Zone details display important information about the zone
List of products affected by vulnerabilities
Highest risk level of the assets of the respective product
Button to switch to 'Threats and tasks'
Display of asset details

none

Number Description
Highest risk level due to an unfixed vulnerability on this asset
Asset name
IP address of the asset
Number and highest risk level of 'Open Threats'

Asset overview

Assets-tab ② in Asset focus shows all the vulnerable assets regardless of zone assignment. This view allows quick search for the specific asset.

none

Number Description
Zones-tab displays asset risk information grouped by zone
Assets-tab displays all the assets affected by vulnerabilities in the system

Threats and tasks

This area shows threats that affect the selected asset ①, as well as recommended or scheduled tasks and, if applicable, asset details ③.

The list of threats ② shows which different threats threaten the security of the asset.

The risk level ⑧ shows how high the risk to the asset is from this threat. The detection date ⑫ indicates when the system first received information about the threats. Vulnerabilities that have already been managed can be hidden ④.

Details of the selected vulnerability ⑤ can be displayed, see 'Threat details'.

When you select an asset, the recommendations and tasks ⑥ are displayed and offered for selection. Changes to the tasks are applied immediately.

Clicking the 'Close' button ⑦ takes you back to the 'Asset list'.

none

Number Description
Information about the asset (name, zone, IP address, installed firmware version)
List of asset vulnerabilities
'Asset details' button
'Hide managed' button
'Threat details' button
List of recommendations and tasks; see 'Task definition'
'Close' button

none

Number Description
Risk level of this vulnerability for this asset
Title of the vulnerability
Organization that disclosed the vulnerability (ID)
Brief description of the vulnerability
Date of detection of the vulnerability for this asset
Status of the vulnerability