Skip to content

Devices

Device inventory and management.

Device Details

Device List

Column Description
Risk Security risk level (color-coded)
IP Network address
Hostname DNS/NetBIOS name
Label Your custom name
Vendor OUI-based manufacturer
Zone Network segment
Ports Open port count

Filters

Quick Filters

Filter Options Use Case
Search IP, hostname, MAC, vendor, label Find specific device
Risk Level Critical, High, Medium, Low, None Focus on risky devices
Trusted All, Trusted, Untrusted Show/hide known devices
Zone Your configured zones Filter by segment

Advanced Filters

Port Filtering

Find devices with specific ports open:

  • Single port: 22
  • Multiple ports: 80,443
  • Port range: 8000-9000

Example: Filter by 22 to find all SSH servers.

Combining Filters

Filters stack together. For example:

  • Zone: IoT + Risk: High = High-risk IoT devices
  • Search: proxmox + Ports: 8006 = Proxmox web interfaces

Quick Actions

Context menu () on each row:

Action Description
Copy IP Copy IP to clipboard
Copy MAC Copy MAC address
Scan Device Run targeted scan
Toggle Trusted Mark as trusted/untrusted
View Details Open device detail page

Device Details

Click any device to see the full detail page.

Info Tab

Field Description
IP Address Current network address
MAC Address Hardware address
Hostname DNS/NetBIOS name
Vendor Manufacturer (from OUI lookup)
OS Operating system (if detected)
First Seen When device was first discovered
Last Seen Most recent scan appearance
Risk Score Calculated security risk

Ports Tab

Field Description
Port Number and protocol (TCP/UDP)
State open, filtered, closed
Service Service name (ssh, http, etc.)
Product Software name
Version Software version

Version Detection

For accurate version detection, run Normal or Intensive scans. Quick scans don't detect service versions.

Security Tab

Section Description
Threat Summary Human-readable risk assessment
Risk Details Breakdown of contributing factors
Recommendations Actionable remediation steps
CVEs Known vulnerabilities (if CVE integration enabled)
Sample Threat Summary

This device has High risk due to exposed SMB service (port 445) and outdated SSH version. SMB is a common target for ransomware. Consider blocking external access and updating the SSH server.

Settings Tab

Field Description
Label Friendly name (e.g., proxmox-01)
Zone Network segment
Trusted Mark as known/expected
Notes Free-form notes

Zones

Organize devices by function for easier management.

Suggested Zones

Zone Purpose Examples
Servers Infrastructure NAS, hypervisors, Docker hosts
Network Network equipment Routers, switches, APs, firewalls
Workstations User devices Desktops, laptops
IoT Smart devices Cameras, thermostats, sensors
DMZ Exposed services Web servers, VPN endpoints
Management Admin interfaces IPMI, iLO, iDRAC
Storage Storage devices SAN, backup targets

Custom Zones

Create your own zones in Settings Zones. Zone names are freeform.


Best Practices

Device Organization Workflow

  1. After first scan: Label all known devices
  2. Assign zones: Group by function
  3. Mark trusted: Reduce alert noise
  4. Add notes: Document purpose, owner, etc.
  5. Regular review: Check for unknown devices