Find Rogue Assets

Services and devices that don’t belong to your organization’s known inventory can pose a major security risk. Discover how you can identify rogue assets outside of your IP ranges with unexpected configurations or certificates using Legacy Search.