Skip to content

Asset Details page

The asset detail page is the main profile view of an asset in the Nanitor UI. It shows the entire picture regarding an asset.

Asset detail page

The Asset Detail page includes the following information:

  • Asset overview (page header): This includes asset fields such as State, Asset type, etc.; asset health score; asset labels; and asset priority of the asset in terms of Confidentiality (C), Integrity (I), and Availability (A).

  • Asset overview tab: This tab includes information about the asset and its health information.

  • Inventory lists: Tabbed information tables with rich information on the device. More detail about each tab is given below.

Asset overview (page header)

The following information is displayed:

  • Asset type: See Asset types for details.
  • Asset state: See Asset state for details.
  • Information source: See Asset discovery for details. For Agent and Collector information source their version will be displayed.
  • OS: The asset OS.
  • Health score: See [Asset health score] (/health/#asset-health-score-ahs)
  • Labels: See Asset labels for details.
  • Asset priority: See [Asset priority] (/prioritization/#static-and-dynamic-priority)

Asset overview tab

The Asset overview tab includes general information about an asset. Asset overview tab

The Asset overview tab includes the following information:

  • Details: This section includes Asset basic info (such as asset hostname, FQDN, asset type, device owner, and more), Asset OS details (including the OS, external and internal IPs), Asset labels, Hardware details (such as Manufacturer, Model name, RAM, etc.), Network interfaces, Partitions, and Priority.
  • Comments: Comments, if any.
  • Health score over time: A linear chart displaying asset health score change over time.
  • Health score by issue type: A widget displaying asset health in regards of detected issues.

Asset actions

On the asset detail page, you will find a range of actions available to help you manage the asset, such as applying labels, archiving it, requesting a checkin, requesting the agent's diagnostic logs, viewing supported features, and more. These actions are available either through an available button or the actions menu in the page header

Asset Details - Actions menu button

The following table provides a list of the actions available on the asset detail page, along with a brief description of what each action does. Some of the actions are restricted to a certain state or a specific type of device, those restrictions are also listed in the table.

Action Description
Apply label Apply a label to this asset.
Assign issues Assign assets issues to a project.
Request Recheck Flags the asset to check in full information next time it is in contact.
Confirm archival Confirms archival of the asset with states "Pending Archival" on all assets with the current filter applying. Note: This does not archive assets unless it has that specific status.
Archive asset Archive the asset manually.
Restore asset Restore a device that was manually archived previously.
Create PDF report Generates a PDF report with information about the asset.
Export issues as CSV Exports inforamation about the assets issues in a list as a CSV file.
Authorize asset Authorize a rogue asset.
Unauthorize asset Revoke the authorization of a rogue asset.
Supported features Opens a dialog displaying what Nanitor features are supported for that device (i.e. misconfiguration checks, patch checks, software inventory, etc.).
Probe Perform a port probe of this asset.

Authorize asset (rogue assets only)

This action allows an admin user to authorize a rogue asset, moving it from the Rogue state.

When an asset discovers an unmonitored asset on the network, that unmonitored asset is added to Nanitor as a rogue asset by default. However, not all unmonitored assets are necessarily rogue (printers for example).

To prevent legitimate assets from being marked as rogue, admin users can use the Authorize asset action to move a rogue asset to the Unmonitored state. This indicates that the asset has been approved and is now considered a legitimate part of the network. By authorizing the asset, it will not be monitored by the system, but it will still be visible in the system as a legitimate asset.

To do this, the user needs to open up the authorize dialog by selecting Authorize asset from the asset actions list:

Asset Details - Actions menu authorize action

This opens up the authorize dialog:

Asset Details - Authorize asset dialog

When authorizing an asset the user is required to provide a reason for the authorization.

This feature allows users to quickly and easily identify and authorize legitimate assets that have been flagged as rogue, reducing the risk of unnecessary security alerts and ensuring that all assets on the network are properly accounted for.

Unauthorize asset (authorized rogue assets only)

This action allows an admin user to revoke the authorization of a rogue asset, the opposite of authorizing it.

To do this, the user needs to open up the unauthorize dialog by selecting Unauthorize asset from the asset actions list:

Asset Details - Actions menu unauthorize action

This opens up the unauthorize dialog:

Asset Details - Unauthorize asset dialog

When unauthorizing an asset the user is required to provide a reason for the authorization to be revoked.

Probe asset (rogue assets only)

When rogue assets are found on the network, it can be difficult to tell which device is which and whether they are known assets on the network or unknown devices that could be malicious. To help identify rogue assets, Nanitor offers port probing and SNMP probing.

The Probe action is available for a rogue asset if port probing has been enabled by an organization admin (Settings -> General -> Network Discovery), allowing the user to probe it for more information. Port probing involves attempting to connect to various well-known ports on the asset to identify whether common services are running, giving a better idea of what the asset is. If SNMP probing is also enabled, the probe will also fetch information on the asset's make and manufacturer through the Simple Network Management Protocol.

So long as port probing has been enabled for the organization, any Nanitor user can initiate a probe of an unauthorized rogue asset. Probing can be performed using the Actions menu for a certain asset in the asset list:

Asset List - Actions menu probe action

When viewing the details of an unauthorized rogue device, a probe can be initiated either from a link in the "Description" panel or from the action menu:

Asset Details - Probe action

Clicking the probe action will bring up a confirmation dialog. Always be sure to have permission from the IT department to initiate a network probe on an asset, as the generated traffic may be disruptive or detected as suspicious by monitoring tools.

Once a probe has been initiated, one of the asset's neighbors (other devices that have detected it on their network) will be chosen to perform the probe. When that asset checks in and is told to probe, the Nanitor Agent on that machine will attempt to connect to various ports on the target asset and report the results back to the Nanitor Server.

If SNMP probing has been enabled, the probe will also attempt to collect some further information about the asset using SNMP v1 and v2, if available. This might include information such as a system name and description, which can be particularly helpful for identifying the asset. Once results have been reported back to the server, they will be shown in the asset detail, below the "Description" panel:

Asset Details - Probe results

SNMP information will be shown there if available, while if open ports are found, the number will link to the Open ports tab. There, you can see information about the ports open on the asset and what well-known services use these ports:

Asset Details - Open ports

In this case, the probe has told us that this device is likely a printer. Assuming we recognize the printer in question, we can confidently authorize the asset.

Inventory lists

The inventory lists provide detailed information about the inventory on the device. Each list is accessible by clicking on the corresponding tab. The information included in each inventory list is documented below.

Benchmarks

List of benchmarks that apply to the asset. Benchmarks are sets of configuration checks. If no benchmarks apply it may mean that the OS does not have a supported benchmark. For a full list of supported benchmarks see: https://kb.nanitor.net/BenchMarks/

Benchmarks applying to an asset as seen in Asset Detail - Inventory lists - Benchmarks

The list shows the benchmarks that currently apply to the asset. For each benchmark, the following information is shown in the columns:

Column Description
Title The title of the benchmark
Version The version of the benchmark
Profile The profile of the benchmark that is being used
Status The current status of the benchmark: Active if being checked regularly.
Baseline Score The current score of this asset for rules that are in Baseline (Technical Policy).
ISO27001 The score for rules that are in ISO27001 compliance framework (note this is configurable based on what compliance framework is selected as the Primary framework).
Last Checkin At The timestamp at which information for this benchmark on this asset was checked in last.

Issues

The Issues inventory list displays current issue violations for the given asset.

Issue violations for a device as shown in Asset Details - Inventory lists - Issues

This table includes the following columns for each issue in the list

Column Description
Issue Represents the issue name and links to the issue detail.
Created The timestamp at which time the issue violation was created for the device.
Type The type of the issue, e.g. misconfiguration, vulnerability, patch, software, user, pii.
Issue Priority The priority of the issue in terms of confidentiality (C), integrity (I) and availability (A).
Prioritization score The prioritization score of the issue, which is determined by multiplying the issue priority and asset priority and taking the highest component.
Action Has an action "Assign issue" which allows assigning the issue to a remediation project.

Note that older issues that have been resolved can be viewed by applying a resolved filter. Various other filters are available to identify sets of issues.

Installed patches

Shows a list of patches that have been installed on the asset. This is only supported on select operating systems where it is applicable.

Installed patch history on an asset as seen in Asset Detail - Inventory lists - Installed patches

This table includes the following columns for each patch in the list

Column Description
Created The timestamp when the patch was first reported as being installed on the asset.
Name The name or identifier of the patch.
Title The title of the patch or the package name (Windows).
Type The type of the update, e.g. "Security Update", "Update"

Identities (Users)

Shows a list of identities (user profiles) on the asset. This includes information such as username, last login, and also an indication of whether the identity is currently logged on. This is a list of identities who have ever logged in and their access level at that time, not identities who currently have access.

User profile inventory for an asset as shown in Asset Detail - Inventory lists - Users

The information included per user profile includes:

  • Username the username of the profile used to log into the system.
  • Name (full name description from Active Directory, or /etc/passwd, etc. depending on the system)
  • Domain: The name of the domain (Windows only)
  • Local Admin: "Yes" if the user can elevate to the local administrator (or root), "No" otherwise.
  • Remote Allowed: "Yes" if the user can log remotely into the asset, "No" otherwise.
  • Last Activity: The timestamp when the profile was last known to be active, as seen by the Nanitor agent.
  • Last Logon: The timestamp when the profile was last seen with a user logged in, as seen by the Nanitor agent.
  • Logged On Now: "Locally" if the user is currently logged in locally on the computer, "Remote" if the user is remotely logged in. The warning triangle indicates that the information may be old if the asset has not checked in recently.

Group policies (Windows only)

The Group policies inventory list displays group policies (sometimes called group policy objects or GPOs) that are active on the asset along with information such as application order, etc. Can be useful to debug why settings are not being applied correctly.

Asset Detail - Inventory lists - Group policies

The information shown includes:

  • Name is the name of the GPO.
  • Applied Order represents the order in which the GPOs apply. This is useful for troubleshooting GPOs, and why a certain setting may or may not be applying correctly.
  • Location describes the AD location where the group policy is linked.

Software

List of software installed on the device.

Software inventory for an asset as shown in Asset Detail - Software (inventory list)

The fields shown are the

  • Name (or display name) is the name of the software. This is typically the DisplayName of the software from the Windows Uninstall registry.
  • Version (or display version) is the version of the software.
  • Publisher is the vendor that produced the software, or if the information is not available it may indicate where it comes from.
  • Created at indicates where the software was first seen.
  • Status represents the compliance status of the software, i.e. whether it is blacklisted, whitelisted, mandatory or neutral (i.e. not with a classified compliance status).

Health Score

The trend of how the Asset Health has progressed over time.

Asset Detail - Inventory lists - Health

It shows the target health score for the organization and the asset health score over time. In addition, the health scores for certain issue types individually can be seen by clicking on the issue type under the graph (not visible by default).

Networks

List of networks that the asset is on along with IP and hardware address information.

Asset Detail - Inventory lists - Networks

This information shows the network name, description (if provided for the network), IP and hardware (HW) address of the asset on the network.

Open ports

The open ports inventory list shows a list of open TCP ports on the asset.

Asset Detail - Inventory lists - Open ports

The information per currently open port shown includes the following columns

  • Port (and name)
  • Description of what normally runs on this port
  • Protocol (TCP / UDP)
  • Listening IP addresses
  • First opened at indicates when the port was first seen open on the asset
  • Last opened at indicates when the port was last seen open on the asset

By default, only open ports are shown. But previously open ports can be seen by filtering on "Previously open ports" in the filter pane.

Services

List of running web services on the asset (if supported). On Linux assets, supported services include Nginx, Apache Tomcat, and Apache Httpd.

Asset Detail - Inventory lists - Services shows a list of running web services

The information per running web service shown includes the following columns

Column Description
Type The web service type, e.g. Tomcat, Nginx, HTTPD
Version Version of the web service program
Details More details such as installed location
Created at Timestamp when the web service was first seen running
Last seen at Timestamp when the web service was last seen running

Neighbors

Neighbors are found through network discovery, where each asset that has network discovery capability can see other devices on the networks it is connected to.

List of neighbors seen on the network through network discovery. Note that the list shown is different depending on the asset type, for:

  • Rogue asset - The list shows all the assets that have discovered/seen the given asset.
  • Other asset types - The list shows all assets that have been seen by the given asset.

Thus when investigating and identifying what a rogue asset is, it can be useful to explore the neighbors and see what devices have been seeing the rogue asset.

List of neighbors on the network | Asset Detail - Inventory lists - Neighbors

The information for each active neighbor that the asset sees includes the following columns

Column Description
Hostname Hostname of the neighbor
State The state of the neighbor in Nanitor
Type The asset type of the neighbor
Labels Asset labels of the neighbor
OS The operating system of the neighbor
First Discovered At The timestamp when the neighbor was first discovered by the asset
Last Discovered At The timestamp when the neighbor was last seen by the asset through network discovery

Activity log

The activity log is an event history and audit log regarding events and changes that Nanitor logs regarding the asset. It includes both state changes on the asset, as well as user- and system-triggered changes.

List of all events that have been recorded for the asset since it was first added. The latest events are shown on top.

The Activity log shows audit trail for the asset | Asset Detail - Inventory lists - Activity log

Note that additional information is available by expanding the event with the down arrow on the left.

The information for each event includes the following columns

Column
Expand/collapse arrow Expands to show full information regarding the event. Collapse to reduce the row height and show less information.
Event details The event message and field details (if expanded)
Time Timestamp when the event was logged
Event type The type of the event, e.g., Security or Audit
Triggered by Event trigger, either System or User. User triggered changes are typically due to changes through the Nanitor UI, whereas system changes are due to automatic changes
Severity The severity of the event: Low / Medium / High.

Comments

The comments tab provides a list of comments that have been made regarding the asset. This provides a way to discuss an asset, for example, if something is surprising or needs to be looked at.

Asset details - Comment tab

Each comment has a timestamp, and the comments are shown ordered by time (newest first). Each comment can also be resolved, for example, if the information no longer applies. This is done by selecting the action menu on the comment (three dots) and selecting "Mark resolved".

Projects

The projects tab provides a list of projects to which the asset has been added.

Asset details - Projects tab

The information for each project includes the following columns:

Column
Name The project name. Click it to get more information on the project.
Satus The project status, e.g., Backlog, In progress, or Done.
Assignee The organization user responsible for the project.
Due date The project due date, if any.