Recently Viewed Topics
The Assets page provides a centralized view of the vulnerabilities discovered by the attached Nessus Network Monitors. On this page, vulnerabilities may be viewed in several categories, including assets, vulnerabilities, applications, operating systems, and connections. The results may also be exported in different formats for use in other programs.
Across all of the viewable methods available on the Assets page, filter options are available to increase granularity when viewing results. Click the heading of a column to sort items within that section in ascending or descending order.
Note: After deleting results, you must restart Industrial Security to see the most up-to-date information.
The Actions drop-down allows you to export or delete results, or apply/remove a label to/from multiple assets if one or more assets are selected. Additionally, if one or more assets are selected and a Nessus scanner is linked to Industrial Security, you can launch an active scan of the selected assets.
Note: The Criticality column rates asset criticality from 1-5. 1 is the least critical, while 5 is the most critical.
The Filter <section name> box allows for quick filtering based on entered text for the Assets page. To view a list of filterable plugin attributes, click the down arrow for any quick filter text field. Results display based on a match of Any or All entered fields. The search field contains example hints when empty, but if an incorrect filter value is entered, the field displays a red border.
Tip: For instructions on performing the actions available on the Assets page, see the related How To section of this guide.
Click on the asset to view one of the following options to view relevant information:
Vulnerabilities detected on this asset appear in descending order of severity. The vulnerabilities list displays the name of each vulnerability, vulnerability family, and the number of vulnerabilities discovered. Select a vulnerability from the list to display vulnerability details including a synopsis, description, solution, plugin information, risk information, reference information, and affected ports and services for the asset.
Applications appear in descending order of severity. The applications list displays the name and number of each application. Select an application from the list to display information about the application observed on this asset.