Services
From the Services page, view which services are running in your organization's networks.
Services table
The Services table includes the names of the services running in your networks and details such as product names, product versions, and ports that the services are running on.
Use the information to determine whether to update internal configurations. For example, filter the table to only include a specific service, then identify whether any organizations within your hierarchy are using an out-of-date version.
We recommend sorting and filtering the data to find individual actions that will reduce or eliminate large numbers of vulnerabilities. For example, sort by vulnerability instances to identify the services with the most vulnerabilities.
For information about table options, see Tables.
Columns and filters
-
To add or remove information in the table, select Columns and choose the columns to view.
-
To view and manage services that meet specific criteria, such as those using a product with an outdated version, select Filters and then select how to narrow the data.
Name | Description |
---|---|
Service | Name of the service that IP addresses are running. |
Product | Name of the product that IP addresses are using to run the service. |
Version | Version of the product that IP addresses are using to run the service. |
Service tags | Reasons the service is potentially vulnerable. For details, see Tags. |
Instance count | Number of service, product, and version instances found for IP addresses running the combination on open ports. If an IP address runs the combination on multiple ports, we count each port as an instance. |
IP address count | Number of IP addresses running the service, product, and version combination on open ports. If an IP address runs the combination on multiple ports, we count the IP address once. |
Ports | Ports running the service, product, and version combination. |
Vulnerability instance count | Number of vulnerability instances found for the service, product, and version combination. An instance is a vulnerability with a CVE number related to the combination on an open port. If there are multiple instances of a combination running on multiple ports, we count the vulnerabilities for each port as an instance. For details, see Vulnerability instances. |
IP address | Filter for finding services running on an IP address or within an IP address range. |
Organization | Filter for finding services associated with an organization from your hierarchy. |