Request a demo
RSS Feed
Support Center
Axonius.com
Home
Axonius Platform
Axonius Platform
Enforcements
Contents
x
Using Axonius Platform
Deploying the Axonius System
Connecting Adapters
Release Notes
Use Cases
Axonius-as-a-Service Trials
Axonius API
Workflows
Campaigns
Powered by
Use Cases
15 Articles
in this category
Share this
Print
Share
Dark
Light
Contents
Use Cases
15 Articles
in this category
Share
Dark
Light
Use Cases
Axonius strengthens asset management by supporting a wide range of use cases. The table below describes some of the main use cases and examples for predefined Saved Queries that supports those use cases. To run a specific predefined Saved Query, s...
Updated on : 24 Mar 2022
Finding Endpoints Missing Agents
Finding Devices Missing Endpoint Agents A common Use Case for Axonius customers is finding devices that are missing specific security agents or other endpoint agents. Here, we will look at why it’s important to find devices missing endpoint agents...
Updated on : 20 Dec 2022
Finding Endpoint Agents Not Functioning Correctly
Watch the “Finding Endpoint Agents Not Functioning Correctly” video, or read below. Finding Endpoint Agents Not Functioning Correctly Much like the Finding Endpoints Missing Agents Use Case where customers are looking to find assets with ...
Updated on : 27 Jun 2022
Finding Devices Not Being Scanned For Vulnerabilities
Watch the “Finding Devices Not Being Scanned For Vulnerabilities” video, or read below. Finding Devices Not Being Scanned For Vulnerabilities Today’s vulnerability assessment tools do an incredible job of identifying known vulnerabilities pr...
Updated on : 22 Sep 2024
Discovering Cloud Instances Not Being Scanned For Vulnerabilities
Discovering Cloud Instances Not Being Scanned for Vulnerabilities Today’s assessment tools do an exceptional job of recognizing known vulnerabilities. However, due to the elastic and ephemeral nature of cloud workloads and the increasing adoption ...
Updated on : 27 Jun 2022
Finding Unmanaged Devices
Watch the “Finding Unmanaged Devices” video, or read below. Finding Unmanaged Devices Organizations today have a comprehensive arsenal of security tools to protect corporate-assigned devices. However, they can only protect the assets they...
Updated on : 27 Jun 2022
Finding Rogue Devices On Privileged Networks
Watch the “Finding Rogue Devices On Privileged Networks” video, or read below. Finding Rogue Devices on Privileged Networks While the definition of a “rogue device” varies widely, a consensus definition would include at least three elements:...
Updated on : 27 Jun 2022
Accelerate Incident Response Investigations
Accelerate Incident Response Investigations Watch the “Accelerate Incident Response” video, or read below. Incident Response and Asset Management Challenges While Security Analysts often receive alerts that tell them what happened and how...
Updated on : 09 Aug 2022
Find Ephemeral Devices
Watch the “Find Ephemeral Devices” video, or read below. An ephemeral device is a device that lasts for a short period. Examples of devices that are often ephemeral include: virtual machines containers unknown devices While many ep...
Updated on : 24 Mar 2022
Find Unsanctioned Software
Watch the “Find Unsanctioned Software” video, or read below. Unsanctioned software often includes potentially unwanted software and applications that cause concern for IT, security, and risk teams. These applications may include software that...
Updated on : 18 Dec 2022
Compiling a User Inventory
Watch the “Compiling a User Inventory” video, or read below. Compiling a User Inventory A user inventory is a complete list of every user account across the varied systems of an organization. User accounts are generally associated with a wide...
Updated on : 18 Dec 2022
Managing Windows & Linux Servers
As with any asset, it’s important to have a credible and comprehensive inventory of all servers in your environment. Whether on-prem or in the cloud, Windows and Linux servers are used for critical business applications and often process sensit...
Updated on : 24 Sep 2024
Finding Obsolete Devices
What Are Obsolete Devices? Obsolete devices are devices which are no longer useful in a business context. They may be legacy or sunsetted devices which have not been removed from the environment, or they may be outdated devices which cannot be upg...
Updated on : 24 Mar 2022
Identifying and Prioritizing Vulnerabilities
Identifying and Prioritizing Vulnerabilities Gain a unified view of your organization’s exposure to vulnerabilities. Identifying vulnerabilities is critical to understanding asset security in your environment, as well as your overall security post...
Updated on : 27 Jun 2022
CMDB Reconciliation & Maintenance
CMDB Reconciliation & Maintenance Watch the “CMDB Reconciliation & Maintenance” video, or read below. Security Challenges and CMDBs For many companies, Configuration Management Databases (CMDBs) are used as a single source of truth...
Updated on : 24 Mar 2022