Fortinet white logo
Fortinet white logo

New Features

Combine the Device Inventory widget and Asset Identity Center page

Combine the Device Inventory widget and Asset Identity Center page

The Device Inventory widget and Asset Identity Center page have been combined to create a more streamlined appearance and to conserve resources. The Security Fabric > Asset Identity Center page offers a unified view of asset information, consolidates data from various sources, and can handle significantly larger sets of data.

Note the following updates:

  • There are four donut charts available in the Asset view: Software OS, Vulnerability Level, Status, and Interface. These charts used to be included in the Device Inventory widget, which is now replaced with the Asset widget.
  • Device information is available in the Hardware Vendor, Device Family, Software OS, and Hardware Version columns.
  • The Interface column is included in the table.
  • The IoT Vulnerabilities and Endpoint Vulnerabilities columns from previous versions have been merged into the Vulnerabilities column.

Combine the Device Inventory widget and Asset Identity Center page

Combine the Device Inventory widget and Asset Identity Center page

The Device Inventory widget and Asset Identity Center page have been combined to create a more streamlined appearance and to conserve resources. The Security Fabric > Asset Identity Center page offers a unified view of asset information, consolidates data from various sources, and can handle significantly larger sets of data.

Note the following updates:

  • There are four donut charts available in the Asset view: Software OS, Vulnerability Level, Status, and Interface. These charts used to be included in the Device Inventory widget, which is now replaced with the Asset widget.
  • Device information is available in the Hardware Vendor, Device Family, Software OS, and Hardware Version columns.
  • The Interface column is included in the table.
  • The IoT Vulnerabilities and Endpoint Vulnerabilities columns from previous versions have been merged into the Vulnerabilities column.