Application inventory
Application Inventory lists all of the programs found on a selected host either by a FortiNAC Windows, MAC, Linux, or Mobile Agent or an agent from an MDM Service that is integrated with FortiNAC.
Right-click a host in the Host View and select Host Applications.
The application inventory is not populated during the initial scan. Subsequent manual or scheduled scans will perform this function. |
FortiNAC agents must be version 3.1 or higher to collect application data. |
Settings
Field |
Definition |
||
---|---|---|---|
Threat Score |
The threat score assigned to the application.
|
||
Operating System |
Device operating system, such as iOS. |
||
Operating System |
The operating system version for the device. (This information may not be available.) |
||
Source |
Source of the application data, such as an MDM Service. |
||
Version |
Operating system version. |
||
Threat Override |
Indicates whether an application as Trusted or Untrusted according to the threat score.
|
||
Package Name |
The namespace in which the application is run. (This information may not be available.) |
||
Submit Date |
The date when the application was last submitted to a Threat Analysis Engine.
|
||
Host Count |
The number of hosts that have the application. |
||
Learned Time |
Date and time that FortiNAC first learned about this device. |
||
Last Updated |
Date and time of the last update t this device in FortiNAC. |
||
Name |
Name of the installed application. |
||
Vendor |
Domain name of the application vendor. |
||
Version |
Version number of the installed application. |
||
Learned Time |
Date and time that FortiNAC first learned about this application. |
||
Export |
Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF, or RTF. See Export data. |
||
Set Threat Override |
Marks an application as Trusted or Untrusted, overriding the existing threat score. The original threat score is not changed, and the override may be set back to "none". Users can also right-click in the Applications table to access this option.
|