Assets Overview

Modified on Mon, 10 Mar at 5:25 PM

Managing Device Assets in the Assets Module

Overview

The Assets Module is used for Inventory Management of devices within an organization. It allows organizations to:

  • Maintain inventory for compliance purposes.
  • Track risk, vulnerabilities, secured devices and unsecured devices.
  • Assign devices to employees for better accountability.



TABLE OF CONTENTS


Device Asset Inventory

The Device Asset Inventory helps organizations track and manage their workstations by creating individual device records. Devices can be added:

  • Individually through the interface.

  • In bulk via spreadsheet upload.

The Guard provides a form with both required and optional fields to capture important device details. 

Adding a New Device

To add a new device:

  • Navigate to the Assets Module.
  • Click + Add Device.
  • Enter the device details in the form fields provided.


Device Information Fields


Field Name

Description

Device Name (Required)

Enter the device's name (e.g., Host Name, ID Tag).

Device Type

Select from: Desktop, Laptop, Server, Network Device (e.g., Router), Cell Phone, Tablet, VoIP Phone, Removable Media, Scanner, Printer, Virtual Machine, or "Other" (include details in Notes).

Activation Date

Enter the estimated or exact date the device was activated.

Asset Tag

If used, enter the asset tag.

Model

Enter the model name or number.

Serial Number

Enter the device's serial number.

Physical Location

Specify the device's location (e.g., "Front Desk," "AWS Data Center").

Security Controls

List security measures such as antivirus, encryption (BitLocker, FileVault), or other protections.

Stores/Touches ePHI

Select Yes/No to indicate whether the device handles electronic Protected Health Information (ePHI).

Associated Site

Select whether the device is Org-Wide or tied to a specific site.

IP Address

If tracking IP addresses, enter the last known IP.

Risk Rating

Assign a risk rating to assess likelihood and impact.

Assign Device to Employee

Identify which workforce member uses the device.

Notes

Add additional information, such as alternative security measures.



Bulk Upload Option

To add multiple devices at once:

  • Download the Bulk Upload Template.
  • Fill in all required fields.
  • Upload the completed spreadsheet into The Guard.

Viewing and Managing Devices

Once devices are added, they appear in the device inventory list within the Assets Module.

The list displays:

  • Device Name

  • Device Type

  • Location

  • Risk Rating

  • Total Vulnerabilities

  • Assigned Employee

  • Last Updated Date & Editor

graph at the top of the page provides a summary of:

  • Total Devices (Active, Deactivated, Destroyed)

  • Risk Analysis

  • Total Vulnerabilities

  • Secured vs. Unsecured Devices


Filtering Device Records

Devices can be filtered by:

  • Encryption status

  • Endpoint Protection

  • ePHI storage

  • Device Type

  • Risk Likelihood & Impact

  • Location

Managing Device Status

Devices can be Deactivated, Destroyed, or Deleted.

Bulk Status Updates

  1. Select the checkboxes of devices to update.

  2. Click Bulk Actions and choose the desired status.

Individual Status Updates

  1. Click the ellipsis button next to a device.

  2. Select Deactivate, Destroy, or Delete.


Adding Evidence to Devices

To attach supporting evidence:

  1. Click the ellipsis button next to a device.

  2. Select Evidence Locker to upload relevant files.

Ongoing Device Management

Device inventories are dynamic and should be updated regularly to reflect the organization's security and compliance requirements.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article