View Host
The Inventory > Assets tab provides host information, including identity, running services, installed software, open ports, users, and more. ETM provides you with deep visibility into your assets, offering a detailed, multidimensional view of each that encompasses IT and security data. With an asset profile that contains a wealth of data, you can identify issues such as configuration problems, security risks, IT policy violations, and regulatory non-compliance.
You can see an overview of assets in your organization from the Assets Overview tab. The following screenshot highlights the key user interface features of the Assets tab under Inventory:

- Search for assets:You can search for assets using a Qualys Query Language (QQL) query for a specific time frame. For more information, see Search Tokens.
The date search evaluates only UTC format for all date-related tokens. The actual search results might show the date according to your time zone.
- Bar chart representation: You can see bar charts for the top hardware and operating system categories. Click a specific bar from the chart to view the list of specific assets for the respective criterion.
- Search criteria provided in the left pane: You can view the total assets matching your search criteria and the asset manufacturer and asset tags with their count of assets from the left pane. Click the count of assets to view the list of assets.
- Quick Actions Menu: You can perform multiple actions, such as viewing asset details, adding tags to the asset, and purging the asset from the Quick Actions menu.
- You can not purge GCP assets using the on-demand method (from Inventory > Assets) tab.
- In a single operation, you can add tags to a maximum of 10,000 assets. For more information, see Manage Asset Tags.
- Asset Criticality Score: You can see the asset criticality score for the assets. For more information, see Asset Criticality Score.
- TruRisk Score: You can see the TruRisk Score of the asset. The TruRisk score enables you to prioritize vulnerabilities, assets, and groups of assets based on the actual risk they pose to the organization. For more information, see TruRisk Score.
- Asset discovery Sources: You can see different sources from where the asset was discovered. For more information, seeSources Column Details.
- Group assets are based on criteria or categories, such as external attack surface, operating system, hardware, AWS, and so on. As shown in the following example, some categories have further subcategories:
