Fortinet black logo

Administration Guide

Asset Identity Center

Asset Identity Center

The Fabric View > Asset Identity Center is the central location for security analysts to view endpoint and user information to make sure they are compliant. Endpoints are important assets in a network as they are the main entry points in a cybersecurity breach.

The asset information is useful for the following:

  • Incident response: check assets that are infected or vulnerable as part of your SOC analysis and incident response process.
  • Compliance: identify unknown and non-compliant users and endpoints.

The Asset Identity Center is also useful for user and endpoint mapping. Some users might use multiple endpoints in the network, endpoints might use multiple different interfaces to connect, network interfaces might have multiple IP addresses, and so on. A map of users and their endpoints gives you better visibility when you analyze logs, events, and incidents. This also helps with your reporting.

This topic includes the following information:

Asset Identity Center

The Fabric View > Asset Identity Center is the central location for security analysts to view endpoint and user information to make sure they are compliant. Endpoints are important assets in a network as they are the main entry points in a cybersecurity breach.

The asset information is useful for the following:

  • Incident response: check assets that are infected or vulnerable as part of your SOC analysis and incident response process.
  • Compliance: identify unknown and non-compliant users and endpoints.

The Asset Identity Center is also useful for user and endpoint mapping. Some users might use multiple endpoints in the network, endpoints might use multiple different interfaces to connect, network interfaces might have multiple IP addresses, and so on. A map of users and their endpoints gives you better visibility when you analyze logs, events, and incidents. This also helps with your reporting.

This topic includes the following information: