13 Managing Assets¶
The assets include hosts, operating systems, and TLS certificates. They are collected during vulnerability scans.
When creating a new task, it is possible to specify whether the host details collected during a scan should be stored in the asset database (see Chapter 10.2.2). The details are stored if the default task settings are used.
13.1 Creating and Managing Hosts¶
During a scan, information about each scanned host is collected. The hosts are identified by their IP addresses.
For each identified host it is checked whether it already exists in the hosts assets. If not, a new host asset is created.
Both when scanning a newly created host and when scanning an existing host, several host details (host names, IP and MAC addresses, operating systems, SSH keys and X.509 certificates) are added to the host asset as identifiers.
If vhost scanning is enabled – which it is by default – (see Chapter 10.13.4), each vhost will be added as its own asset entry. Thus, due to the nature of vhosts, IP address identifiers may appear multiple times. Such assets must then be distinguished by their other host identifiers.
13.1.1 Creating a Host¶
Hosts can also be manually added to the asset management to create targets from them (see Chapter 13.1.3).
Except for the IP address, no other details about the host can be defined but further details will be added when scanning the manually added host.
A host can be created as follows:
Select Assets > Hosts in the menu bar.
Create a new host by clicking in the upper left corner of the page.
Enter the IP address of the host in the input box Name (see Fig. 13.1).
Click Save.
This feature is also available via GMP (see Chapter 15). The import of hosts from a configuration management database can be achieved using this option.
13.1.2 Managing Hosts¶
List Page
All existing hosts can be displayed by selecting Assets > Hosts in the menu bar (see Fig. 13.2).
For all hosts the following actions are available:
Create a new target from the host (see Chapter 13.1.3).
Note
By clicking , or below the list of hosts more than one host can be deleted, exported or used to create a new target at a time. The drop-down list is used to select which hosts are deleted, exported or used to create a new target.
Details Page
Click on the name of a host to display the details of the host. Click to open the details page of the host.
The following registers are available:
- Information
General information about the host.
Any identifying information collected for the host during scans, for example, host names, IP and MAC addresses, operating systems, SSH keys and X.509 certificates, is displayed in the section All Identifiers (see Fig. 13.3).
Note
If identifiers have duplicates, only the latest identifiers are shown. In this case, the section is named Latest Identifiers and all identifiers can be displayed by clicking Show all Identifiers below the table.
For all host identifiers the following action is available:
- User Tags
Assigned tags (see Chapter 8.4).
- Permissions
Assigned permissions (see Chapter 9.4).
The following actions are available in the upper left corner:
Create a new host (see Chapter 13.1.1).
13.1.3 Creating a Target from Hosts¶
A target with a set of hosts can be created as follows:
Filter the hosts so that only the hosts that should be used for the target (for example only Microsoft Windows hosts) are displayed (see Chapter 8.3).
Create a new target by clicking below the list of hosts (see Fig. 13.4).
→ The window for creating a target is opened. The input box Hosts is prefilled with the set of displayed hosts.
Define the target and click Save.
Tip
For the information to enter in the input boxes see Chapter 10.2.1.
Note
If additional suitable hosts show up in further scans they will not be added to the target.
13.2 Managing Operating Systems¶
The operating systems view within the asset management provides a different view on the stored data. While the hosts view is centered on the individual hosts, this view focuses on the operating systems detected during all vulnerability scans.
Note
For a reliable operating system identification, VT(s) specific to the operating system(s) in question must be available in the Greenbone Enterprise Feed. If no specific VTs are available, the appliance still tries to identify the operating system(s), but the identification happens with a lower quality of detection and is prone to false-positive detections.
List Page
All operating systems can be displayed by selecting Assets > Operating Systems in the menu bar (see Fig. 13.5).
For all operating systems the following information is displayed:
- Name
CPE (see Chapter 14.2.2) of the operating system.
- Title
Plain name of the operating system.
- Severity – Latest
Severity detected for the operating system during the last scan that found this operating system on a host. Only hosts where the respective operating system was determined to be the best match are taken into account.
- Severity – Highest
Highest severity detected for the operating system during all scans that found this operating system on a host. Only hosts where the respective operating system was determined to be the best match are taken into account.
- Severity – Average
Average severity detected for the operating system during all scans that found this operating system on a host. Only hosts where the respective operating system was determined to be the best match are taken into account.
- Hosts – All
All hosts where the operating system was detected. By clicking on the number of hosts, the page Hosts is opened. A filter is applied to show only the hosts for which the selected operating system was detected.
- Hosts – Best OS
Hosts where the operating system was detected as the best match. By clicking on the number of hosts, the page Hosts is opened. A filter is applied to show only the hosts for which the selected operating system was detected as the best match.
- Modified
Date and time of last modification.
For all operating systems the following actions are available:
Note
By clicking or below the list of operating systems more than one operating system can be deleted or exported at a time. The drop-down list is used to select which operating systems are deleted or exported.
Details Page
Click on the name of an operating system to open the details page of the operating system.
The following registers are available:
- Information
General information about the operating system.
- User Tags
Assigned tags (see Chapter 8.4).
- Permissions
Assigned permissions (see Chapter 9.4).
The following actions are available in the upper left corner:
13.3 Managing TLS Certificates¶
This view focuses on the TLS certificates collected during all vulnerability scans and provides a quick overview of whether they are valid or expired.
Note
Only basic certificate information (host, port, activation and expiry dates, fingerprints) is included.
There is no support for Online Certificate Status Protocol (OCSP) or Certificate Revocation List (CRL) functionalities.
List Page
All existing TLS certificates can be displayed by selecting Assets > TLS Certificates in the menu bar (see Fig. 13.6).
For all TLS certificates the following actions are available:
Note
By clicking or below the list of TLS certificates more than one TLS certificate can be deleted or exported at a time. The drop-down list is used to select which TLS certificates are deleted or exported.
Details Page
Click on the name of a TLS certificate to display the details of the TLS certificate. Click to open the details page of the TLS certificate.
The following registers are available:
- Information
General information about the TLS certificate.
- User Tags
Assigned tags (see Chapter 8.4).
- Permissions
Assigned permissions (see Chapter 9.4).
The following actions are available in the upper left corner: