13 Managing Assets

When creating a new task it can be defined whether the results of the scan should be stored in the assets (see Chapter 10.2.2).

13.1 Creating and Managing Hosts

13.1.1 Creating a Host

Hosts can be added to the asset management as follows:

  1. Select Assets > Hosts in the menu bar.

  2. Create a new host by clicking new in the upper left corner of the page.

  3. Enter the IP address of the host in the input box Name (see Fig. 13.1).

    _images/host_new.png

    Fig. 13.1 Creating a new host

  4. Click Save.

This feature is also available via GMP (see Chapter 15). The import of hosts from a configuration management database can be achieved using this option.

13.1.2 Managing Hosts

List Page

All existing hosts can be displayed by selecting Assets > Hosts in the menu bar (see Fig. 13.2).

_images/hosts_scanned.png

Fig. 13.2 Page Hosts displaying all scanned hosts

For all hosts the following actions are available:

  • delete Delete the host.
  • edit Edit the host.
  • new Create a new target from the host (see Chapter 13.1.3).
  • export Export the host as an XML file.

Note

By clicking delete, export or new below the list of hosts more than one host can be deleted, exported or used to create a new target at a time. The drop-down list is used to select which hosts are deleted, exported or used to create a new target.

Details Page

Click on the name of a host to display the details of the host. Click details to open the details page of the host.

The following registers are available:

Information

General information about the host.

Any identifying information collected for the host during scans, e.g., host names, IP and MAC addresses, operating systems, SSH keys and X.509 certificates, is displayed in the section All Identifiers (see Fig. 13.3).

Note

If identifiers have duplicates, only the latest identifiers are shown. In this case, the section is named Latest Identifiers and all identifiers can be displayed by clicking Show all Identifiers below the table.

For all host identifiers the following action is available:

  • delete Delete the identifier.
_images/all_identifiers.png

Fig. 13.3 All identifiers

User Tags
Assigned tags (see Chapter 8.5).
Permissions

Assigned permissions (see Chapter 9.4).

The following actions are available in the upper left corner:

  • help Open the corresponding chapter of the user manual.
  • list Show the list page of all hosts.
  • new Create a new host (see Chapter 13.1.1).
  • edit Edit the host.
  • trashcan Delete the host.
  • export Export the host as an XML file.
  • results Show the corresponding results.

13.1.3 Creating a Target from Hosts

A target with a set of hosts can be created as follows:

  1. Filter the hosts so that only the hosts that should be used for the target (e.g., only Microsoft Windows hosts) are displayed (see Chapter 8.4).

  2. Create a new target by clicking new below the list of hosts (see Fig. 13.4).

    → The window for creating a target is opened. The input box Hosts is prefilled with the set of displayed hosts.

    _images/host_new_target.png

    Fig. 13.4 Creating a target with the displayed hosts

  3. Define the target and click Save.

    Tip

    For the information to enter in the input boxes see Chapter 10.2.1.

    Note

    If additional suitable hosts show up in further scans they will not be added to the target.

13.2 Managing Operating Systems

The operating systems view within the asset management provides a different view on the stored data. While the hosts view is centered on the individual hosts, this view concentrates on the used operating systems.

List Page

All operating systems can be displayed by selecting Assets > Operating Systems in the menu bar (see Fig. 13.5).

_images/operatingsystems_listpage.png

Fig. 13.5 Page Operating Systems displaying all scanned operating systems

For all operating systems the following actions are available:

  • delete Delete the operating system. Only operating systems which are currently not used can be deleted.
  • export Export the operating system as an XML file.

Note

By clicking delete or export below the list of operating systems more than one operating system can be deleted or exported at a time. The drop-down list is used to select which operating systems are deleted or exported.

Details Page

Click on the name of an operating system to open the details page of the operating system.

The following registers are available:

Information
General information about the operating system.
User Tags
Assigned tags (see Chapter 8.5).
Permissions
Assigned permissions (see Chapter 9.4).

The following actions are available in the upper left corner:

  • help Open the corresponding chapter of the user manual.
  • list Show the list page of all operating systems.
  • delete Delete the operating system. Only operating systems which are currently not used can be deleted.
  • export Export the operating system as an XML file.
  • host Show the corresponding hosts.

13.3 Managing TLS Certificates

TLS certificates are collected during scanning.

List Page

All existing TLS certificates can be displayed by selecting Assets > TLS Certificates in the menu bar (see Fig. 13.6).

For all TLS certificates the following actions are available:

  • delete Delete the TLS certificate.
  • download Download the TLS certificate.
  • export Export the TLS certificate as an XML file.

Note

By clicking delete or export below the list of TLS certificates more than one TLS certificate can be deleted or exported at a time. The drop-down list is used to select which TLS certificates are deleted or exported.

_images/tls_certificates_listpage.png

Fig. 13.6 Page TLS Certificates displaying all collected TLS certificates

Details Page

Click on the name of a TLS certificate to display the details of the TLS certificate. Click details to open the details page of the TLS certificate.

The following registers are available:

Information
General information about the TLS certificate.
User Tags
Assigned tags (see Chapter 8.5).
Permissions
Assigned permissions (see Chapter 9.4).

The following actions are available in the upper left corner:

  • help Open the corresponding chapter of the user manual.
  • list Show the list page of all TLS certificates.
  • delete Delete the TLS certificate.
  • download Download the TLS certificate.
  • export Export the TLS certificate as an XML file.