Devices
Use the Devices dashboard in Risk Monitor to explore different aspects of the devices in your IT estate.
Description
You can, for example, see:
-
The number and percentage of devices with vulnerable applications.
-
The number of applications installed on devices of a specific device type.
-
The operating systems most commonly used on devices in the IT estate.
The Device details table lists detailed information about each device, for example, if it has antivirus protection installed, if it is connected to file sharing or VPN services, and the number of vulnerable applications installed on the device.
You can filter the data to focus on a certain subset of the devices in our organization. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:
-
A specific device.
-
All devices with a specific application installed.
-
All devices with applications containing a specific vulnerability, that is, CVE ID.
-
All devices with vulnerable applications installed.
-
All devices with PII risk applications installed.
-
All devices within a specific department in the organization.
Related use cases
For information on related use cases, see the following sections:
Characteristics
You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.
Key figures
The key figures give a quick overview of the devices in your IT estate.
Key figure | Description |
---|---|
Inventoried | The number of devices in your IT estate. |
Vulnerable | The number of devices with at least one vulnerable application. |
PII risk | The number of devices with at least one application that may contain personally identifiable information. |
Vulnerable PII risk | The number of devices with at least one application that is both vulnerable and may contain personally identifiable information. |
Filters
Use one or more filters to focus on certain aspects of the devices in your IT estate. All the key figures, charts and tables on the dashboard will adjust to show the results filtered by the selected parameter or parameters.
Filter | Description |
---|---|
Application name | Select an application from the list to see an overview of all devices with the application installed. |
Organization | Select an organizational unit from the list to see an overview of all devices belonging to that organizational unit. |
CVE ID | Select a CVE ID from the list to see an overview of all devices with applications containing the vulnerability connected to the CVE ID. |
Device name | Select a device name from the list to see details for that device, for example, operating system, if the device has antivirus, VPN or Filesharing, and how many vulnerable or PII risk applications are installed on the device. |
Vulnerable application | Select True to see an overview of all devices with vulnerable applications. Select False to see an overview of all devices without vulnerable applications. |
PII risk | Select True to see an overview of all devices with PII risk applications. Select False to see an overview of all devices without PII risk applications. |
Charts
Use the charts to get insights into different aspects of the devices in your IT estate.
You can select a bar in a chart to focus on a specific aspect, for example, all devices with a certain operating system installed. All the key figures, charts, and tables on the dashboard will adjust to show the results filtered by the selected item.
Chart | Description |
---|---|
Operating system installations | Groups the number of operating system installations on devices by operating system. Tip: To verify that a specific operating system is installed only on expected device types, select the bar for the operating system. The Installed applications by device type chart will adjust to show all device types with the selected operating system installed. |
Installed applications by device type | Groups the number of installed applications by device type. Tip: To get a list of all applications installed on devices of a specific device type, right-click the bar for the device type, select Drill through, and then Applications. This will take you to the Applications dashboard adjusted to only show details about applications installed on devices of the selected device type. The Application details table lists all applications connected to the device type. |
Installed applications by domain | Groups the number of installed applications by domain. |
Tables
Use the table to look up details about devices in your IT estate. Select a column header to sort the table by that column.
Table | Description |
---|---|
Device details | Unfiltered, the table includes all devices in your IT estate. The following details are shown in the table:
|