Get detailed information on assets
Table of content
- View detailed asset data
- External and internal assets
- Asset de-duplication
- Asset management
- Port status
- View list of ports under the asset
- View issue discovered in your asset
1. View detailed asset data
Accessing Asset details in Autobahn helps you understand the specific risks each asset poses and how to address them effectively. By reviewing detailed information about the source, vulnerabilities or ports, you gain the context needed to prioritize actions and strengthen your security posture.
To view these insights, click the active link in the Autobahn platform in the asset’s name, IP address, or hostname. This will take you to the Asset detail page, where the Asset Overview section provides a high-level summary to help you quickly assess the asset’s risk profile.
The content of this section may vary depending on the asset’s source (e.g. vulnerability scanning versus data integration such as Microsoft Defender for Endpoint). In general, it provides essential context for understanding and managing the asset effectively.
Three fields: Criticality, Assignee and Tag can be edited directly from this view. While these are typically managed from the Asset Overview or during the asset creation process, you can also update them individually here. They play an important role in asset management, helping you assign responsibility and categorize assets for better tracking and prioritization.
Now, let’s explore how Network classification and de-duplication work in Autobahn.
2. External and Internal assets
In Autobahn, assets are categorized as either internal or external:
- External assets are accessible from the internet.
- Internal assets reside within your private network and are not reachable from outside.
You can identify the asset type by checking the Network field:
- Internet – indicates an externally accessible asset.
- Default internal or a custom internal network name - used for internal assets. Custom names are typically configured when your setup requires multiple internal probes. This configuration is defined during the internal scan setup process in collaboration with your Customer Success Manager, based on your network’s structure, reachability and Autobahn license.
3. Asset de-duplication
Autobahn automatically de-duplicates assets from multiple sources to ensure data consistency. If the same asset is scanned by more than one engine or is fetched by other data sources (integrations), it will appear as a single entry in Autobahn.
The de-duplication logic depends on the asset type:
-
- External assets are matched and merged based on their IP address.
- Internal assets are merged based on their hostname.
This mechanism ensures a unified view of each asset, regardless of how many sources report on it.
4. Asset management
As mentioned above, the Asset overview allows you to edit key fields such as criticality, assignees, and tags - all essential for effective asset management.
-
Asset Criticality helps you identify which assets require the highest level of protection. There are three levels: Critical, Substantial, and Moderate. You can use these classifications to filter assets in custom dashboards, focus on your most valuable systems, and view a detailed Hackability Score for your crown jewels.
-
Assigning a scan to a team member is strongly recommended for structured remediation. This assignment automatically applies to all related assets, issues, and workouts, ensuring clear ownership and accountability throughout the remediation process.
-
Tags are also a best practice for organizing and managing assets. They make it easier to filter views, group assets, and build custom dashboards. Tags can represent business units, locations, technologies, network segments, or any other meaningful categorization - helping you make sense of your data at scale.
5. Port-related data
Next to the Overview section, you'll find the Port overview. This area provides visibility into the asset’s exposed services by listing IP addresses or domains with ports categorized as New, Open, or Closed:
- New – Ports that were discovered for the first time during the most recent scan.
- Open – Ports that were already identified in a previous scan and remain accessible in the latest scan.
- Closed – Ports that were previously open but are no longer reachable in the most recent scan.
This information helps you track changes in your asset’s exposure over time and identify potential security implications.
The Port details section displayed below provides a comprehensive view of the ports associated with your asset. Open ports can expose your systems to risk, as attackers often exploit vulnerabilities in the services running on them - such as outdated software, weak credentials, or misconfigured applications.
To reduce your attack surface, it’s best practice to deactivate any unused or unnecessary ports. Doing so minimizes potential entry points and strengthens your organization’s overall security posture. This section lists both active and inactive ports, helping you stay informed and take action where needed to protect your assets.
Please note that assets fetched by a method that doesn't include port scanning (e.g. imported from Microsoft Defender for Endpoint) may not include the Port details data.
6. Issue-related data
To keep you informed about the security posture of your asset, Autobahn also displays the list of issues associated with each asset. As you resolve issues, their status will update accordingly, giving you a clear, real-time overview of the asset’s risk status.
This view is designed primarily for data presentation, offering a snapshot of issue activity related to the asset. For issue management, you can navigate to the Issue details view by clicking the issue name, or go to the Issues page, where you can filter issues by asset and take further action. The Issues page serves as both a data presentation and management hub.
Within the Issue details view, you’ll also find a direct link to the relevant Workout, which provides step-by-step remediation guidance. The associated asset information is included there as well, ensuring you have the full context needed to resolve the issue effectively.