Skip to main content

Asset Catalogue Overview


Overview

The Asset Catalogue aggregates all assets discovered or imported into the Vulnerability Scanner.
Each entry includes:
  • Asset value (domain, IP, URL, or application)
  • Vulnerability count
  • Last scan status
  • Exposure level
  • Associated scanner
  • Automated risk score
This centralized view helps identify unscanned assets, high-risk systems, or resources repeatedly flagged in tests.

Key Metrics

Total Assets

Total number of assets detected across all scans and integrations.

Assets With Vulnerabilities

Shows how many assets contain one or more active vulnerabilities.

Scan Coverage

Indicates how many assets have been scanned recently vs. pending.

Search, Filters & Sorting

The catalogue includes powerful filtering for fast investigation.

Available Filters

FilterDescription
ScannerFilter assets by the scanner that detected them.
ExposureIdentify exposed, internal, shadow, or unverified assets.
Risk ScoreSort by automated risk evaluation.
hasVulnsShow only assets with active vulnerabilities.
Date RangeFilter by detection or last scanned timeline.
These filters allow analysts to focus on urgent or high-risk targets efficiently.

Asset Table Columns

Each asset includes detailed metadata:
ColumnDescription
Asset ValueURL, domain, or IP representing the scanned target
ScannerThe scanner engine used to test the asset
Vuln CountNumber of vulnerabilities detected
ExposureWhether the asset is external, internal, or unknown
Auto RiskSystem-generated risk score
Last ScanTimestamp of the most recent scan
TagsLabels for categorization and governance
Detected OnFirst time the asset was discovered

Asset Detail View

Asset Detail View

Each asset includes a full detail page showing:
  • Summary information
  • Vulnerability list
  • Scan history
  • Technologies detected
  • Exposure reasoning
  • Risk insights
  • Evidence linkage
This allows deep investigation of a specific system.

How Assets Are Discovered

Assets may be added to the catalogue through:
  • Manual submission during scan creation
  • CI/CD pipelines
  • Scheduled scans
  • Integrations with ASM, VM, or AIM
  • API-based imports
The catalogue automatically updates as new assets appear in your environment.

Example Use Cases

Prioritize High-Risk Assets

Identify assets with critical vulnerabilities or high exposure.

Improve Asset Coverage

Detect assets that have not been scanned recently and schedule tests.

Track Asset Lifecycle

Monitor first-found, last-seen, and scan activity over time.

Support Incident Response

Pull up vulnerabilities and scan history for an affected asset instantly.

Next Steps

Open Vulnerability Catalogue

Explore all vulnerabilities linked with your scanned assets.