Skip to main content

Overview

The Workstation Directory provides full visibility into all employee-linked devices, including laptops, virtual machines, and decommissioned workstations.
AIM automatically aggregates workstation data from integrated adapters, correlates vulnerabilities, assigns risk scores, and tracks exposure over time.

Workstation Overview Dashboard


Key Metrics

MetricDescription
153 WorkstationsTotal discovered devices in the environment.
138 Vulnerable WorkstationsDevices associated with at least one vulnerability.
15 Tested WorkstationsSystems assessed through active scanning integrations.
153 ShadowedUnmanaged or unassigned workstations discovered via adapters.
These metrics enable IT and security teams to quickly understand the scale, health, and risk posture of employee devices.

Severity & Risk Distribution

AIM categorizes workstation risk using multiple factors including vulnerability counts, exposure state, and workstation classification.

Severity & Risk Distribution

This helps teams immediately identify high-risk devices that require patching or remediation.

Search, Filters & Sorting

Powerful filters allow you to locate specific devices or isolate high-priority assets.
FilterPurpose
OwnersFind devices tied to a specific employee.
RiskSort by system-generated workstation risk score.
ExposureIdentify exposed or decommissioned workstations.
AdaptersFilter based on data source (CSV, VM, directory sync, etc.).
hasVulnsShow devices with open vulnerabilities.
Filters can be combined for precise investigation workflows.

Workstation Table Fields

Each workstation entry includes complete metadata used for security, IT operations, and compliance.
ColumnDescription
Asset ValueIP or identifier for the workstation.
SourceOrigin of discovery (e.g., CSV import, VM scan).
Vuln CountNumber of vulnerabilities linked to the device.
Auto RiskAIM-generated workstation risk score.
OwnerAssociated employee or Unknown.
TagsLabels such as VM, workstation, decommissioned.
AssociationsConnected assets (e.g., repositories, certificates).
Detected OnFirst and most recent discovery timestamps.

Workstation Table in AIM


Workstation Full View

Each workstation’s detail page offers a deep dive into risk and activity:

Summary Includes

  • Device status (active, shadowed, decommissioned)
  • Vulnerability totals
  • Exposure classification
  • Risk score
  • Owner or responsible team
  • Detection timeline

Additional Panels

  • Vulnerability history & severity charts
  • Tags & metadata
  • Associations with other assets
  • Lifecycle actions (Assign Owner, Decommission, Delete)
These insights allow teams to track workstation behavior and exposure trends over time.

Lifecycle Management

AIM supports complete end-to-end workstation lifecycle operations:
  • Assign Owner — link the workstation to an employee
  • Decommission Device — retire outdated or inactive systems
  • Delete Asset — remove invalid or duplicate entries
All updates sync across AIM modules, enabling consistent asset management.

How AIM Detects Workstations

Workstation data is collected automatically from:
  • Directory sync adapters (employee device inventories)
  • Vulnerability scanners
  • CSV imports
  • Network discovery tools
AIM continuously updates device metadata, risk scores, and exposure classifications.

Example Use Cases

  • Security Teams: Identify vulnerable devices and prioritize remediation.
  • IT Teams: Track device ownership, lifecycle status, and activity.
  • Compliance: Ensure all employee devices are accounted for and monitored.
  • Incident Response: Investigate compromised or suspicious workstations rapidly.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.