Table of Contents | ||||
---|---|---|---|---|
|
...
Data source | Description | Dump type | Devo data tables |
Scans | History of processes by which the application discovers network assets and checks them for vulnerabilities. | Full dump |
|
Assets | Device/s on a network discovered during a scan. | Full dump |
|
Sites | Collection of assets that are targeted for a scan. | Full dump |
|
Vulnerabilities | Reported vulnerabilities found during a scan. | New events |
|
...