Fortinet white logo
Fortinet white logo

Release Notes

Application inventory

Application inventory

Application Inventory lists all of the programs found on a selected host either by a FortiNAC Windows, MAC, Linux, or Mobile Agent or an agent from an MDM Service that is integrated with FortiNAC.

Right-click a host in the Host View and select Host Applications.

Note

The application inventory is not populated during the initial scan. Subsequent manual or scheduled scans will perform this function.

Note

FortiNAC agents must be version 3.1 or higher to collect application data.

Settings

Field

Definition

Threat Score

The threat score assigned to the application.

Note

This field appears only when the Security Incidents license is enabled.

Operating System

Device operating system, such as iOS.

Operating System
Version

The operating system version for the device. (This information may not be available.)

Source

Source of the application data, such as an MDM Service.

Version

Operating system version.

Threat Override

Indicates whether an application as Trusted or Untrusted according to the threat score.

Note

This field appears only when the Security Incidents license is enabled.

Package Name

The namespace in which the application is run. (This information may not be available.)

Submit Date

The date when the application was last submitted to a Threat Analysis Engine.

Note

This field appears only when the Security Incidents license is enabled.

Host Count

The number of hosts that have the application.

Learned Time

Date and time that FortiNAC first learned about this device.

Last Updated

Date and time of the last update t this device in FortiNAC.

Name

Name of the installed application.

Vendor

Domain name of the application vendor.

Version

Version number of the installed application.

Learned Time

Date and time that FortiNAC first learned about this application.

Set Threat Override

Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option.

Note

This field appears only when the Security Incidents license is enabled.

Application inventory

Application inventory

Application Inventory lists all of the programs found on a selected host either by a FortiNAC Windows, MAC, Linux, or Mobile Agent or an agent from an MDM Service that is integrated with FortiNAC.

Right-click a host in the Host View and select Host Applications.

Note

The application inventory is not populated during the initial scan. Subsequent manual or scheduled scans will perform this function.

Note

FortiNAC agents must be version 3.1 or higher to collect application data.

Settings

Field

Definition

Threat Score

The threat score assigned to the application.

Note

This field appears only when the Security Incidents license is enabled.

Operating System

Device operating system, such as iOS.

Operating System
Version

The operating system version for the device. (This information may not be available.)

Source

Source of the application data, such as an MDM Service.

Version

Operating system version.

Threat Override

Indicates whether an application as Trusted or Untrusted according to the threat score.

Note

This field appears only when the Security Incidents license is enabled.

Package Name

The namespace in which the application is run. (This information may not be available.)

Submit Date

The date when the application was last submitted to a Threat Analysis Engine.

Note

This field appears only when the Security Incidents license is enabled.

Host Count

The number of hosts that have the application.

Learned Time

Date and time that FortiNAC first learned about this device.

Last Updated

Date and time of the last update t this device in FortiNAC.

Name

Name of the installed application.

Vendor

Domain name of the application vendor.

Version

Version number of the installed application.

Learned Time

Date and time that FortiNAC first learned about this application.

Set Threat Override

Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option.

Note

This field appears only when the Security Incidents license is enabled.