Computer attackers look in target organizations for vulnerable versions of software that can be remotely exploited. We'll show you what applications are installed on the hosts in your environment through an easy to search inventory. This inventory gives you up to the minute visibility on software and network ingress points so you can properly defend and secure your assets.
Just go to VM/VMDR > Assets > Applications. Newly discovered applications are added automatically to the inventory as new scan results become available in your account.
Enter a search value. Then click Search to update the data list with your results or click Download CSV to get your results in a CSV report. If you click Download CSV without entering a search value you'll get the full list.
Be sure to run vulnerability scans on the hosts you would like to track in the inventory of applications. Your inventory will be populated after the scan status is "Finished" and the scan processing status is "Processed".
The New Data Security Model must be enabled for the subscription in order for you to see applications for your hosts. A Manager can enable the New Data Security Model by going to Users > Setup > Security. Be sure to run new scans after enabling the New Data Security Model.
You can search for "OpenSSL" to find all hosts running OpenSSL and the versions. Then download the results to CSV.