Discovered Applications
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or Administrator
On the Applications page, you can drill down to view only your Discovered applications.
To view your discovered applications:
-
In the upper-left corner, click the button.
The left navigation plane appears.
-
In the left navigation plane, click Applications.
The Applications page appears. By default, the Scanned tab is visible and applications visualizations are shown.
-
In the lower-left, click Discovered.
The Discovered applications list appears.
-
In the discovered applications assets table, you can perform any, or all, of the following actions by clicking the button:
-
Add Tag to your finding.
-
Remove Tag from your finding.
-
Delete the finding from your list.
You can view basic information about your discovered applications in the following table.
Column | Description |
---|---|
Application ID | The UUID of the asset where a scan detected the vulnerability. This value is unique to Tenable Web App Scanning. |
Created Date |
The time and date when Tenable Vulnerability Management created the asset record. |
Domain | The domain name for the asset. |
DNS (FQDN) (ASM) | The fully qualified domain name of the asset host. |
First Seen |
The date when a scan first found the vulnerability on an application. |
IP Address | The IP address for the asset, if any. |
Host Name |
The hostname for the asset. |
Hosting Provider | The hosting provider for the asset. |
Last Seen |
The date when a scan last found the vulnerability on an asset. |
Licensed | Specifies whether the asset is included in the asset count for Tenable Web App Scanning. |
Name |
The asset name. Tenable Web App Scanning assigns this identifier based on the presence of certain asset attributes in the following order:
For example, if scans identify a NetBIOS name and an IPv4 address for an asset, the NetBIOS name appears as the asset name. This column appears in the table by default. |
Port | The port associated with the asset. |
Record Type | The type of asset. |
Record Value | The value of the asset. |
Source |
The source of the scan that identified the asset. Possible values are:
|
Tags |
Asset tags, entered in pairs of category and value (for example Network: Headquarters). This includes the space after the colon (:). If there is a comma in the tag name, insert a backslash (\) before the comma. If your tag name includes double quotation marks (" "), use the UUID instead. You can add a maximum of 100 tags. For more information, see Tags. |
Updated Date |
The time and date when a user last updated the asset. |
Vulnerabilities | The number of vulnerabilities found on the scanned application. |