TOC & Recently Viewed

Recently Viewed Topics


Note: This section describes the new interface. For information about the classic interface, see Assets in the Classic Interface.

The Assets page provides insight into your organization's assets and their vulnerabilities.

This page contains top-level widgets that provide a snapshot of the asset scanning status, as well as a table that lists assets scans have identified in your network. The top-level widgets include:

Widget Description
Discovered Last 30 Days The number of assets that scans first identified in the last 30 days.
Scanned Last 30 Days The percentage of your total assets that a scan of any type has assessed in the last 30 days.
Authenticated Scan Last 30 Days The percentage of your total assets that a credentialed scan has assessed in the last 30 days.

You can do the following from the Assets page:

Tip: For information about navigating the new interface, see Navigate New Interface.

About Assets includes the ability to track assets that belong to your organization. Assets are entities of value on a network that can be exploited. This includes laptops, desktops, servers, routers, mobile phones, virtual machines, software containers, and cloud instances. By providing comprehensive information about the assets that belong to your organization, helps to eliminate potential security risks, identify under-utilized resources, and support compliance efforts. automatically creates or updates assets when a scan completes or scan results are imported. attempts to match incoming scan data to existing assets using a complex algorithm. This algorithm looks at attributes of the scanned hosts and employs a variety of heuristics to choose the best possible match. If cannot find a match, the system assumes this is the first time has encountered the asset and creates a new record for it. Otherwise, if finds a matching asset, the system updates any properties that have changed since the last time encountered the asset.

In addition to vulnerability information, also attempts to gather various other information about the asset, including:

  • Interfaces (IP address and MAC address)
  • DNS Names
  • NetBIOS Name
  • Operating System
  • Installed Software
  • UUIDS (Tenable, ePO, BIOS)
  • Whether an agent is present

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.