Review Your Applications

Computer attackers look in target organizations for vulnerable versions of software that can be remotely exploited. We'll show you what applications are installed on the hosts in your environment through an easy to search inventory. This inventory gives you up to the minute visibility on software and network ingress points so you can properly defend and secure your assets.

Just go to VM/VMDR > Assets > Applications. Newly discovered applications are added automatically to the inventory as new scan results become available in your account.

Perform search and download results

Enter a search value. Then click Search to update the data list with your results or click Download CSV to get your results in a CSV report. If you click Download CSV without entering a search value you'll get the full list.

Why don't I see any applications?

Be sure to run vulnerability scans on the hosts you would like to track in the inventory of applications. Your inventory will be populated after the scan status is "Finished" and the scan processing status is "Processed".

Why don't I see the Applications tab?

The New Data Security Model must be enabled for the subscription in order for you to see applications for your hosts. A Manager can enable the New Data Security Model by going to Users > Setup > Security. Be sure to run new scans after enabling the New Data Security Model.

 

Did you know? You can search for "OpenSSL" to find all hosts running OpenSSL and the versions. Then download the results to CSV.