Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Zombie Assets: Displays the total number and the percentage change of zombie assets in your networks. Zombie assets are network devices, including idle public IP addresses, detached storage volume, and idle load balancers, that are vulnerable for or compromised by a hacker via virus, computer worms, or trojan horse programs to perform malicious acts.

  • Unregistered Assets: Displays the total number and the percentage change of unregistered assets in your networks. Unregistered assets are network devices that have missing DNS records or have not been registered as legitimate assets in your network. These assets may not have trusted certificates or fingerprints. If a device is not assigned to the correct subnet for the given IP space, it is shown as unregistered.

  • Noncompliant Assets: Displays the total number and the percentage change of noncompliant assets in your networks. Non-compliant assets include publicly accessible storage, publicly accessible virtual machines, unsecured storage volume, and permissive security groups.

...

  • Zombie Assets by Confidence Level: This monitor summarizes the total number of zombie assets by their confidence level. Click the chart to access the detail view of the zombie assets.

  • Unregistered Assets with Missing Records: This monitor summarizes the total number of unregistered assets that have missing records, such as IP address, asset type, MAC address, and other DNS records. Click the chart to access the detail view of the unregistered assets. In the detail view, you can review information such unregistered assets by category and by location.

  • Registered Assets by Category: This monitor summarizes the total registered assets in the networks by category, such as compute. Click the chart to access the detail view of the registered assets.

  • New Assets by Category: This monitor summarizes the total registered assets in the networks by category, such as compute. Click the chart to access the detail view of the registered assets.

  • Noncompliant Assets: This monitor shows the assets that may not be very secure due to their configuration. For example, they may be publicly accessible, have unsecured storage, or have permissive security settings.

  • Assets by Location: This Monitor monitor shows the assets categorized by location.

...