Application view
The Application View is part of a window that includes menu options for Users, Adapters, Hosts, and Applications.
Applications for scanned hosts connected to your network appear in the Application view. As hosts are scanned, the list of applications is updated.
You may not have access to all of the fields listed in this table. Access depends on the type of license key installed and which features are enabled in that license.
The fields listed in the table below are displayed in columns on the Application view based on the selections you make in the Settings window. See Configure table columns and tooltips. Most of these fields are also used in Custom Filters. See Search and filter options.
Settings
Field |
Definition |
||
---|---|---|---|
Add Filter drop-down list |
Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. Options include:
See Filters. |
||
Update button |
Displays the filtered data in the table. |
||
Security events |
|||
Name |
The name of the application. |
||
Threat Score |
The threat score assigned to the application.
|
||
Version |
The version of the application being scanned. (This information may not be available.) |
||
Vendor |
The name of the vendor providing the application. (This information may not be available.) |
||
Operating System |
The operating system of the device containing the application. |
||
Operating System |
The operating system version for the device. (This information may not be available.) |
||
Source |
The agent that is used to scan the application. |
||
Threat Override |
Indicates whether an application as Trusted or Untrusted according to the threat score. This field appears only when the ATR license is enabled. You must have ATR enabled in your licensing package in order to use ATR features. |
||
Package Name |
The namespace in which the application is run. (This information may not be available.) |
||
Submit Date |
The date when the application was last submitted to a Threat Analysis Engine.
|
||
Host Count |
The number of hosts that have the application. |
||
Buttons |
|||
Export |
The Export option allows you to export a list of selected applications to CSV, Excel, PDF or RTF formats. |
||
Options |
The Options button displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user. |
||
Show Hosts |
Opens the Host View displaying the host(s) containing the application. Users can also right-click in the Applications table to access this option. |
||
Delete |
Deletes the selected application. Users can also right-click in the Applications table to access this option. |
||
Rescan |
Rescans the selected application for threat analysis. Users can also right-click in the Applications table to access this option.
|
||
Set Threat Override |
Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option. This option appears only when the ATR license is enabled. You must have ATR enabled in your licensing package in order to use ATR features. |
Show the host(s) containing an application
- Select Hosts > Application View to access the Application View.
- Select an application in the table and click the Show Hosts button, or right-click an application and select Show Hosts from the menu.
The Host View is displayed showing the host(s) that contain the application.
Set the threat override for an application
Set threat override lets users mark an application as trusted or untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none".
You must have ATR enabled in your licensing package in order to use ATR features. |
- Select Hosts > Application View to access the Application View.
- Select an application in the table and click the Set Threat Override button, or right-click an application and select Set Threat Override from the menu.
- Select Trusted or Untrusted from the drop-down menu.
- Click OK.