Application view
The Application View is part of a window that includes menu options for
Applications for scanned hosts connected to your network appear in the Application view. As hosts are scanned, the list of applications is updated.
You may not have access to all of the fields listed in this table. Access depends on the type of license key installed and which features are enabled in that license.
The fields listed in the table below are displayed in columns on the Application view based on the selections you make in the Settings window. See Configure table columns and tool-tips. Most of these fields are also used in Custom Filters. See Search and filter options for hosts, adapters, users, or applications.
Field |
Definition |
---|---|
Add Filter drop-down list |
Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. Options include:
See Filters. |
Update button |
Displays the filtered data in the table. |
Name |
The name of the application. |
Threat Score |
The threat score assigned to the application. This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features. |
Version |
The version of the application being scanned. (This information may not be available.) |
Vendor |
The name of the vendor providing the application. (This information may not be available.) |
Operating System |
The operating system of the device containing the application. |
Operating System |
The operating system version for the device. (This information may not be available.) |
Source |
The agent that is used to scan the application. |
Threat Override |
Indicates whether an application as Trusted or Untrusted according to the threat score. This field appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features. |
Package Name |
The namespace in which the application is run. (This information may not be available.) |
Submit Date |
The date when the application was last submitted to a Threat Analysis Engine. This field appears only when the RTR license is enabled. |
Host Count |
The number of hosts that have the application. |
Export |
The Export option allows you to export a list of selected applications to CSV, Excel, PDF or RTF formats. |
Options |
The Options button displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user. |
Show Hosts |
Opens the Host View displaying the host(s) containing the application. Users can also right-click in the Applications table to access this option. |
Delete |
Deletes the selected application. Users can also right-click in the Applications table to access this option. |
Rescan |
Rescans the selected application for threat analysis. Users can also right-click in the Applications table to access this option. This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features. |
Set Threat Override |
Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option. This option appears only when the RTR license is enabled. You must have RTR enabled in your licensing package in order to use RTR features. |