Skip to main content

Netskope Help

Netskope asset inventory

Navigate to the Inventory tab to see the assets captured in Netskope IoT Security. You can see the assets in device view and event view.

Search and filter the inventory

On top of the screen, you can find a search bar that filters results. You can use:

You can clear the search filter using the cross button on the right of the search bar. By clicking on the star, you can save the search and later see it in the Reporting > Saved searches menu.

  • Advanced filters - allow you to make a query in the database if you known about the discovery parameters. For example, category = "computer" AND blocked != true will show results of devices which are computers and not blocked in the network. The HELP button on the right side of the screen shows you some basic formats to use the advanced filter.

  • Basic filters - are simple and you can filter the assets by selecting specific parameters from the list. For example, selecting the operating system as “android” will filter results of assets which are using the android operating system.

Device view
  • You can see a chart with distinct devices in your environment and hovering on it will show the number of devices of that type.

  • The following table shows the device details like host name, interface connection, operating system, type, risk of device, etc.

  • You can click on the device to see the detailed device summary.

  • Click on the Report button to generate a report of the devices in excel or CSV format.

  • You can select the devices in the table and apply or disable device tags. You can only apply the existing tags. To create new tags, navigate to the Manage > Tags and Groups menu.

Event view
  • You can see the number of devices with risk at the top right chart.

  • You can see the host name, type, tags assigned and managed or unmanaged information.

  • Click on the “details” link to see the device risk summary.

  • You can see the risk score calculated by Netskope proprietary risk engine, which categorizes packet alerts, device software vulnerabilities and device behavior anomalies into threat vectors.

  • It shows if the device is Wi-Fi, wired or undefined interface connected.

  • You can see the operating system and site assigned information. It shows if the device is user or automatically controlled.

  • The list of issues with every device is listed in front of the device name. Click on a specific issue for more information of the issue.