Skip to content

Asset Detail

The asset detail page provides a comprehensive view of a single asset, including its properties, security posture, identifiers, assigned policies, findings, vulnerabilities, and inventory data.

Accessing the Detail Page

Click on any asset Name link in the asset list to open its detail page. You can also navigate here from search results, findings, vulnerability views, or asset group member lists.

Header and Info Cards

The top of the page displays the asset name as the page title, along with a breadcrumb trail (Assets > Asset Name) and an Actions button.

Below the header, a row of info cards summarizes the asset's key properties at a glance:

CardDescription
TypeThe asset type (e.g., Virtual Machine, Firewall, Relational Database)
CategoryThe asset category (e.g., Compute, Network, Data)
PlatformThe OS platform icon and label (shown only for compute assets -- Linux, Windows, macOS)
EnvironmentA color-coded badge showing the deployment environment (Dev, Test, Staging, Prod)
CriticalityA color-coded badge showing business importance (Low, Medium, High, Critical)
StatusThe current lifecycle state (Active, Inactive, Merged)
OwnerThe assigned owner's name (shown only if an owner is set)
GroupThe asset group name (shown only if the asset belongs to a group)

If the asset has tags, they appear in a horizontal bar below the info cards.

Actions Menu

Click the Actions button in the top-right corner to access:

ActionDescriptionRequired Role
EditOpen the edit form to update asset detailsPosture Manager or higher
DeleteDelete the asset after confirmationPosture Manager or higher

Tabs

The detail page is organized into six tabs, each providing a different view of the asset's data.

Dashboard Tab

The Dashboard tab is the default view when you open the detail page. It provides a posture status overview for this asset, including:

  • Overall posture score: The compliance percentage across all assigned policies
  • Policy breakdown: A per-policy summary showing pass/fail/error counts
  • Last evaluation date: When policies were last evaluated against this asset

This tab gives you an immediate sense of the asset's security health without needing to drill into individual findings.

Identifiers Tab

The Identifiers tab lists all key-value pairs that identify this asset:

Each identifier shows:

  • Type: The identifier category (Hostname, IPv4, Cloud Resource ID, etc.)
  • Value: The identifier value
  • Custom badge: A blue "Custom" tag is shown for non-standard identifier types

Identifiers are set during asset creation or editing, and are also populated automatically by adapters and sensors during discovery.

Policies Tab

The Policies tab shows all security policies assigned to this asset. The table includes:

ColumnDescription
NameThe policy name (links to the policy detail)
DescriptionA brief summary of what the policy evaluates
PlatformThe target platform (e.g., Windows, Linux, Azure)

From this tab you can:

  • Assign Policies: Add additional policies to evaluate against this asset
  • Remove a policy assignment

TIP

Policies can be assigned to individual assets or to entire asset groups. If this asset belongs to a group, it automatically inherits all policies assigned to that group.

Findings Tab

The Findings tab displays all security findings generated by policy evaluations for this asset. Each finding represents a specific rule that passed, failed, or produced an error during evaluation.

Key information per finding:

  • Rule name and description
  • Status (Pass, Fail, Error)
  • Severity (Informational, Low, Medium, High, Critical)
  • Policy the finding belongs to
  • Last evaluated timestamp

Use this tab to understand exactly which security rules this asset violates and what needs remediation.

Vulnerabilities Tab

The Vulnerabilities tab lists known vulnerabilities correlated to this asset based on its installed software inventory. Each entry includes:

FieldDescription
CVE IDThe Common Vulnerabilities and Exposures identifier
SeverityCVSS-based severity (Critical, High, Medium, Low)
EPSS ScoreExploit Prediction Scoring System probability
KEVWhether the vulnerability is in CISA's Known Exploited Vulnerabilities catalog
Affected PackageThe installed software package that introduces the vulnerability
Fixed VersionThe version that resolves the vulnerability (if available)

INFO

Vulnerability data requires inventory information. Assets with a bound sensor or adapter-collected software data will have the most complete vulnerability coverage.

Inventory Tab

The Inventory tab shows the software and configuration data collected from this asset. This includes:

  • Installed packages: Software packages with name, version, and source
  • Configuration data: OS settings, security configurations, and other system properties
  • Change history: Timeline of inventory changes detected across collection runs

Inventory data is collected by sensors (for endpoint assets) and by adapters (for cloud resources that report software metadata).

AttackLens - Continuous Exposure Management