Applications
Use the Applications dashboard in Risk Monitor to explore different aspects of the applications in your IT estate.
Description
You can, for example, see:
-
The distribution of applications between manufacturers in the Application manufacturers chart.
-
If there is an unexpectedly large amount of applications of a type that should not be commonly used in your organization in the Application types chart.
-
The number of vulnerable applications that are out of support but for which upgrades are available in the Application installations risk cross-over chart.
You can look up the exact versions of installed applications in the Application details table.
You can filter the data to focus on specific aspects of the applications. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:
-
All applications installed on a specific device.
-
All applications within a specific department in the organization.
-
All vulnerable applications within the organization.
-
All PII risk applications within the organization.
-
All open source applications within the organization.
Related use cases
For information on related use cases, see the following sections:
-
List all applications in your organization that may contain personally identifiable information
-
See all vulnerable PII risk applications in the organization
-
List all users with access to a specific PII risk application
-
See what, and how many, open source applications are present in your IT estate
-
See all users, devices, or applications that are impacted by a specific vulnerability
Characteristics
You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.
Key figures
The key figures give a quick overview of the applications in your IT estate.
Key figure | Description |
---|---|
Installed | The total number of applications installed on devices in the organization. |
Vulnerable | The number of installed applications containing at least one vulnerability. |
PII risk | The number of installed applications that may contain personally identifiable information. |
Vulnerable PII risk | The number of installed applications that are both vulnerable and may contain personally identifiable information. |
Filters
Use one or more filters to focus on certain aspects of the applications in your IT estate. All the key figures, charts, and tables on the dashboard will adjust to show the results filtered by the selected parameter or parameters.
Filter | Description |
---|---|
Device name | Select a device from the list to see an overview of applications installed on that device. The table Application details will list all applications installed on the device and the number of vulnerabilities for each application. |
Organization | Select an organizational unit from the list to see an overview of applications used by that organizational unit. |
Vulnerable application | Select True to see an overview of all vulnerable applications. Select False to see an overview of all applications without vulnerabilities. |
PII risk | Select True to see an overview of installed applications that are designed to hold personally identifiable information. Select False to see an overview of installed applications that do not hold personally identifiable information. |
CVE ID | Select a CVE ID from the list to see if any applications in your IT estate contain the vulnerability connected to the CVE ID. If the vulnerability is not present in your organization the page will show blank results. |
Open source | Select True to see an overview of all open source applications in your IT estate. Select False to see an overview of all applications in your IT estate that are not open source. |
Charts
Use the charts to get insights into different aspects of the applications in your IT estate.
You can select a bar in a chart to focus on a specific aspect, for example, all applications from a certain manufacturer. All the key figures, charts, and tables on the dashboard will adjust to show the results filtered by the selected item.
Chart | Description |
---|---|
Application installations risk cross-over | Each circle in the diagram represents applications in your IT estate with a specific characteristic:
|
Application manufacturers | Groups the number of installed applications by manufacturer. |
Application types | Groups the number of installed applications by application type. |
Tables
Use the table to look up details about applications in your IT estate.
Select a column header to sort the table by that column.
Table | Description |
---|---|
Application details | Unfiltered, the table includes all applications in your IT estate, grouped by application manufacturer. For each application, all software versions present in the IT estate are listed. The following details are shown in the table:
|