On the Assets workbench, you can get insight into your organization's assets. These include host assets, cloud resources, web applications, and domain inventory.
Assets are entities of value on a network that can be exploited. They include laptops, desktops, servers, routers, mobile phones, virtual machines, software containers, and cloud instances. By providing comprehensive information about your assets, Tenable Vulnerability Management helps to eliminate potential security risks, identify under-utilized resources, and support compliance efforts.
Tenable Vulnerability Management automatically creates or updates assets when a scan completes or scan results are imported. Tenable Vulnerability Management attempts to match incoming scan data to existing assets through a complex algorithm which looks at host attributes and employs heuristics to choose the best possible match. If Tenable Vulnerability Management cannot find a match, it assumes this is the first time it has encountered the asset and creates a new record. If Tenable Vulnerability Management finds a matching asset, it updates any newly changed properties.
- Interfaces (IP address and MAC address)
- DNS names
- NetBIOS names
- Operating System(s)
- Installed software
- UUIDS (Tenable, ePO, BIOS)
- Whether an agent is present
See the following topics for more information.