Appearance
Asset Detail
The asset detail page provides a comprehensive view of a single asset, including its properties, security posture, identifiers, assigned policies, findings, vulnerabilities, and inventory data.
Accessing the Detail Page
Click on any asset Name link in the asset list to open its detail page. You can also navigate here from search results, findings, vulnerability views, or asset group member lists.
Header and Info Cards
The top of the page displays the asset name as the page title, along with a breadcrumb trail (Assets > Asset Name) and an Actions button.
Below the header, a row of info cards summarizes the asset's key properties at a glance:
| Card | Description |
|---|---|
| Type | The asset type (e.g., Virtual Machine, Firewall, Relational Database) |
| Category | The asset category (e.g., Compute, Network, Data) |
| Platform | The OS platform icon and label (shown only for compute assets -- Linux, Windows, macOS) |
| Environment | A color-coded badge showing the deployment environment (Dev, Test, Staging, Prod) |
| Criticality | A color-coded badge showing business importance (Low, Medium, High, Critical) |
| Status | The current lifecycle state (Active, Inactive, Merged) |
| Owner | The assigned owner's name (shown only if an owner is set) |
| Group | The asset group name (shown only if the asset belongs to a group) |
If the asset has tags, they appear in a horizontal bar below the info cards.
Actions Menu
Click the Actions button in the top-right corner to access:
| Action | Description | Required Role |
|---|---|---|
| Edit | Open the edit form to update asset details | Posture Manager or higher |
| Delete | Delete the asset after confirmation | Posture Manager or higher |
Tabs
The detail page is organized into six tabs, each providing a different view of the asset's data.
Dashboard Tab
The Dashboard tab is the default view when you open the detail page. It provides a posture status overview for this asset, including:
- Overall posture score: The compliance percentage across all assigned policies
- Policy breakdown: A per-policy summary showing pass/fail/error counts
- Last evaluation date: When policies were last evaluated against this asset
This tab gives you an immediate sense of the asset's security health without needing to drill into individual findings.
Identifiers Tab
The Identifiers tab lists all key-value pairs that identify this asset:
Each identifier shows:
- Type: The identifier category (Hostname, IPv4, Cloud Resource ID, etc.)
- Value: The identifier value
- Custom badge: A blue "Custom" tag is shown for non-standard identifier types
Identifiers are set during asset creation or editing, and are also populated automatically by adapters and sensors during discovery.
Policies Tab
The Policies tab shows all security policies assigned to this asset. The table includes:
| Column | Description |
|---|---|
| Name | The policy name (links to the policy detail) |
| Description | A brief summary of what the policy evaluates |
| Platform | The target platform (e.g., Windows, Linux, Azure) |
From this tab you can:
- Assign Policies: Add additional policies to evaluate against this asset
- Remove a policy assignment
TIP
Policies can be assigned to individual assets or to entire asset groups. If this asset belongs to a group, it automatically inherits all policies assigned to that group.
Findings Tab
The Findings tab displays all security findings generated by policy evaluations for this asset. Each finding represents a specific rule that passed, failed, or produced an error during evaluation.
Key information per finding:
- Rule name and description
- Status (Pass, Fail, Error)
- Severity (Informational, Low, Medium, High, Critical)
- Policy the finding belongs to
- Last evaluated timestamp
Use this tab to understand exactly which security rules this asset violates and what needs remediation.
Vulnerabilities Tab
The Vulnerabilities tab lists known vulnerabilities correlated to this asset based on its installed software inventory. Each entry includes:
| Field | Description |
|---|---|
| CVE ID | The Common Vulnerabilities and Exposures identifier |
| Severity | CVSS-based severity (Critical, High, Medium, Low) |
| EPSS Score | Exploit Prediction Scoring System probability |
| KEV | Whether the vulnerability is in CISA's Known Exploited Vulnerabilities catalog |
| Affected Package | The installed software package that introduces the vulnerability |
| Fixed Version | The version that resolves the vulnerability (if available) |
INFO
Vulnerability data requires inventory information. Assets with a bound sensor or adapter-collected software data will have the most complete vulnerability coverage.
Inventory Tab
The Inventory tab shows the software and configuration data collected from this asset. This includes:
- Installed packages: Software packages with name, version, and source
- Configuration data: OS settings, security configurations, and other system properties
- Change history: Timeline of inventory changes detected across collection runs
Inventory data is collected by sensors (for endpoint assets) and by adapters (for cloud resources that report software metadata).
Related
- Manage Assets -- Return to the asset list
- Edit an Asset -- Update this asset's details
- Delete an Asset -- Remove this asset
- Understanding Assets -- Asset concepts and lifecycle