Fortinet black logo

Control Manager

Application view

Copy Link
Copy Doc ID c0e495af-7299-11e9-81a4-00505692583a:798049
Download PDF

Application view

The Application View is part of a window that includes menu options for Users, Adapters, Hosts, and Applications.

Applications for scanned hosts connected to your network appear in the Application view. As hosts are scanned, the list of applications is updated.

You may not have access to all of the fields listed in this table. Access depends on the type of license key installed and which features are enabled in that license.

The fields listed in the table below are displayed in columns on the Application view based on the selections you make in the Settings window. See Configure table columns and tool-tips. Most of these fields are also used in Custom Filters. See Search and filter options for hosts, adapters, users, or applications.

Field

Definition

Add Filter drop-down list

Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. Options include:

  • Name
  • OS
  • OS Version
  • Package Name
  • Source
  • Threat Override (RTR only) - Select Trusted or Untrusted
  • Threat Score (RTR only) - Enter a single number or a range of numbers
    (e.g., 8-10)
  • Vendor
  • Version

See Filters.

Update button

Displays the filtered data in the table.

Security Events

Name

The name of the application.

Threat Score

The threat score assigned to the application.

This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Version

The version of the application being scanned. (This information may not be available.)

Vendor

The name of the vendor providing the application. (This information may not be available.)

Operating System

The operating system of the device containing the application.

Operating System
Version

The operating system version for the device. (This information may not be available.)

Source

The agent that is used to scan the application.

Threat Override

Indicates whether an application as Trusted or Untrusted according to the threat score.

This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Package Name

The namespace in which the application is run. (This information may not be available.)

Submit Date

The date when the application was last submitted to a Threat Analysis Engine.

This field appears only when the RTR license is enabled.

Host Count

The number of hosts that have the application.

Buttons

Export

The Export option allows you to export a list of selected applications to CSV, Excel, PDF or RTF formats.

Options

The Options button displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user.

Show Hosts

Opens the Host View displaying the host(s) containing the application. Users can also right-click in the Applications table to access this option.

Delete

Deletes the selected application. Users can also right-click in the Applications table to access this option.

Rescan

Rescans the selected application for threat analysis. Users can also right-click in the Applications table to access this option.

This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Set Threat Override

Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option.

This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Application view

The Application View is part of a window that includes menu options for Users, Adapters, Hosts, and Applications.

Applications for scanned hosts connected to your network appear in the Application view. As hosts are scanned, the list of applications is updated.

You may not have access to all of the fields listed in this table. Access depends on the type of license key installed and which features are enabled in that license.

The fields listed in the table below are displayed in columns on the Application view based on the selections you make in the Settings window. See Configure table columns and tool-tips. Most of these fields are also used in Custom Filters. See Search and filter options for hosts, adapters, users, or applications.

Field

Definition

Add Filter drop-down list

Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. Options include:

  • Name
  • OS
  • OS Version
  • Package Name
  • Source
  • Threat Override (RTR only) - Select Trusted or Untrusted
  • Threat Score (RTR only) - Enter a single number or a range of numbers
    (e.g., 8-10)
  • Vendor
  • Version

See Filters.

Update button

Displays the filtered data in the table.

Security Events

Name

The name of the application.

Threat Score

The threat score assigned to the application.

This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Version

The version of the application being scanned. (This information may not be available.)

Vendor

The name of the vendor providing the application. (This information may not be available.)

Operating System

The operating system of the device containing the application.

Operating System
Version

The operating system version for the device. (This information may not be available.)

Source

The agent that is used to scan the application.

Threat Override

Indicates whether an application as Trusted or Untrusted according to the threat score.

This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Package Name

The namespace in which the application is run. (This information may not be available.)

Submit Date

The date when the application was last submitted to a Threat Analysis Engine.

This field appears only when the RTR license is enabled.

Host Count

The number of hosts that have the application.

Buttons

Export

The Export option allows you to export a list of selected applications to CSV, Excel, PDF or RTF formats.

Options

The Options button displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user.

Show Hosts

Opens the Host View displaying the host(s) containing the application. Users can also right-click in the Applications table to access this option.

Delete

Deletes the selected application. Users can also right-click in the Applications table to access this option.

Rescan

Rescans the selected application for threat analysis. Users can also right-click in the Applications table to access this option.

This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.

Set Threat Override

Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option.

This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features.