General

What information is available on the Device Agent asset?

The device overview provides a comprehensive summary of various aspects related to the Device Agent. In this article, we will clarify the significance of the information displayed when you access a specific Device Agent within the asset manager.

General

In the general section, you will find the following:

  • UID: The unique identifier of the Device Agent asset.
  • User Account: The account name of the target asset.
  • Hostname: The designated network hostname associated with the target asset.
  • Agent Version: The version of the Device Agent software.
  • State: Shows if the asset is counted as an active asset toward your license.
  • Uptime: Shows the amount of time passed since the device was last counted as offline.
  • IPv4: The network IPv4 address utilized by the device most recently.
  • IPv6: The network IPv6 address utilized by the device most recently.
  • MAC address: The device's unique identifier assigned to its network hardware.
  • Operating system: Shows the current version and build of the operating system installed on the device.
  • Type: This indicates whether the Device Agent is identifying the target as a personal computer (PC) or a server system.
  • Last activity: The time and date on which the device agent was last able to communicate with Security Center.

Vulnerabilities

This section provides you with a clear overview of all identified vulnerabilities on the target device.

In this view, you can filter the vulnerabilities by:

  • State: There are four different states you can filter on these are the following.
    • New - Vulnerabilities that was detected for the first time in the most recent communication with Security Center.
    • Active - The vulnerability is present on the device and needs remediation.
    • Reopened - This refers to a vulnerability that was previously undetectable by the Device Agent. It is marked as reopened when the Device Agent identifies the vulnerability again. Once the vulnerability is consistently reported by the Device Agent, its status will change to active.
    • Fixed - The Vulnerability is closed and is no longer identifiable on the target.
  • Severity: Vulnerabilities are classified into five distinct severity levels, determined by their CVSS (Common Vulnerability Scoring System) score. The classifications are as follows:
    • Info: 0,0
    • Low: 0,1 – 3,9
    • Medium: 4,0 – 6,9
    • High: 7,0 – 8,9
    • Critical: 9,0 – 10,0

Installed Applications

This section provides a detailed inventory of all applications installed on the target device, along with their corresponding versions.

Tags

In this section you have an overview of all the tags the asset belongs to.