Host assets are the IP addresses in your account. Host assets may be used as scan, map and report targets.
Viewing hosts: View hosts in your account by selecting Host Assets on the left menu, under Tools. You can only perform actions like scanning, mapping and reporting on the hosts that you have privileges to. If you are a Manager, then this list includes all hosts in the subscription. If you are an Auditor, this list includes all compliance hosts in the subscription. If you are a Unit Manager, this list includes all hosts in your assigned business unit. For Scanners and Readers, this list includes all hosts assigned to you. For a Unit Manager, Scanner or Reader, compliance hosts may be available depending on your account privileges. To view the compliance hosts from the host assets list, select Compliance Hosts from the View menu.
Adding hosts for Vulnerability Management (VM): All hosts added to the subscription are automatically available for vulnerability management tasks. You can add hosts to the subscription if the number of IPs in the subscription is less than the number of IPs purchased. You can view the number of IPs purchased for vulnerability management by going to Help > Account Info and expanding the Vulnerability Management (VM) Summary section. See Adding Hosts for information.
Adding hosts for Policy Compliance (PC): When the compliance module is enabled for the subscription, then hosts in the subscription may be added to the PC module, making them available for compliance management tasks. Hosts added to the PC module are referred to as compliance hosts and these hosts may be selected as targets for compliance scans and FDCC scans (when the FDCC module is enabled for the subscription). Like with VM, you can only add hosts to the PC module if the number of compliance IPs in the subscription is less than the number of compliance IPs purchased. You can view the number of IPs purchased for policy compliance by going to Help > Account Info and expanding the Policy Compliance (PC) Summary section. See Adding Hosts to the PC Module for information.
Every host in the subscription is assigned a tracking method: IP address, DNS Hostname or NetBIOS hostname. The assigned tracking method determines how the host will be reported in scan reports. Hosts assigned a tracking method of DNS hostname or NetBIOS hostname will be listed in alphabetical order by hostname. Hosts assigned a tracking method of IP address will be listed in numerical order by IP address. Initially, all hosts are tracked by IP address. See Tracking Methods for information, including important notes about changing the tracking method for a host and scanning hosts tracked by DNS or NetBIOS hostname.\
When adding or editing hosts, you can provide additional details like the host's function and location. There are three user-defined host attribute fields on the Host Information page for providing additional information. Initially, host attribute names are Location, Function and Asset Tag. Managers can customize host attribute names to match the terminology used in your organization. For example, if your organization assigns Inventory IDs to hosts, then "Asset Tag" may be changed to "Inventory ID" at the subscription level. See Customizing Host Attribute Names for information.
Hosts may be excluded on a per scan basis or on a global basis. No scanning traffic, including ICMP, TCP and UDP probes, will be sent to excluded hosts. See Excluding Hosts for information.
Purge host information to permanently remove all saved host information and scan history. This includes host information collected from vulnerability scans, compliance information collected from compliance scans (when the compliance module is enabled), and FDCC compliance information collected from FDCC scans (when the FDCC module is enabled). See Purging Hosts for information.