Home Governance Risk Compliance Vulnerabilities Assets Log In Book a Demo
Asset Inventory Configuration Items

One Inventory.
Every Asset That Matters.

Track 11 asset types from 7 source types, keep configuration items and M365 devices in the same system, and connect every asset to vulnerabilities, risks, vendors, and compliance work. When a finding lands, you already have the operational context.

Asset inventory table showing servers, workstations, and cloud assets with security grades and vulnerability counts
0
Asset Types
0
Source Types
0
Compliance States
0
Unified Inventory

Your Asset Coverage, at a Glance

How many assets have critical vulnerabilities right now? How many warranties expire in the next 90 days? Which assets have gone dark? ElectriCISO answers these questions before your auditor, your insurer, or an attacker does.

Asset inventory table with security grades, vulnerability counts, and agent health status across all asset types
Filtered by Type
Servers, workstations, cloud, mobile, network, and software each in their own filtered view
Security Graded
A–F security score per asset derived from live vulnerability and compliance data
Lifecycle Tracked
Warranty dates, purchase dates, and end-of-life alerts surfaced before they become audit findings
Stale Detection
Assets inactive for 90+ days flagged automatically — before an attacker finds them first
One Click from Number to Names

Knowing how many assets have critical vulnerabilities is not useful. Knowing which assets do is. Click any KPI card and ElectriCISO opens the exact asset list behind that metric — filtered, sorted, and ready for action. No pivot tables, no manual work.

Scanner-Agnostic. Every Asset Type Covered.

Bring data from ConnectSecure, Nessus, Qualys, Rapid7, or other major scanners — ElectriCISO normalizes and deduplicates across all sources into one unified inventory. Servers, workstations, cloud instances, mobile devices, network devices, and software licenses each have their own filtered view with search, sorting, and status filters tuned to that type.

Servers
OS version, patch level, vulnerability counts, and compliance posture per host
Workstations & Mobile
Endpoint inventory with Intune device sync, last-seen timestamps, and security grades
Cloud & Network
Cloud instances, network devices, and infrastructure assets unified in one inventory
Software Licenses
License seat counts, renewal dates, and cost tracking — license sprawl under control
Servers Workstations Network Mobile Cloud Software
Asset browser table with type filters, compact search, sortable columns, and security grade badges
M365 Asset Bridge
4-LEVEL CORRELATION
1 Device ID Exact Match
2 Serial Number Hardware Match
3 Hostname Network Match
4 Display Name Fallback Match
Auto
Sync on M365 pull
MDE
Vuln feed included
Intune
Device compliance
M365 & Intune Integration

Your M365 Devices Populate Automatically

Connect your Microsoft 365 tenant once. Every Intune-managed device correlates into your asset inventory automatically — matched by device ID, serial number, hostname, or display name, in that priority order. No manual imports. No spreadsheets. And when ConnectSecure already has that device, ElectriCISO matches and updates it rather than creating a duplicate.

Automatic on Every M365 Sync
The Asset Bridge runs automatically every time M365 data is refreshed — no manual trigger required
MDE Vulnerability Data Included
Microsoft Defender for Endpoint vulnerability findings feed the same canonical deduplication engine as ConnectSecure
Intelligent Deduplication
A device already in your inventory from ConnectSecure is matched and updated — not duplicated — when M365 syncs
Configuration Items

IT Documentation That Talks to Your GRC Program

SSL certificates, ISP circuits, firewall configurations, software licenses, and cloud services — documented in the same platform as your compliance assessments and risk register. Link a backup configuration failure directly to its risk register entry. Link a software license to the physical device it runs on. The connections your auditor asks about are already there.

8 Pre-Built Templates

Application / Software License
Vendor, seats, cost, renewal date, license key (encrypted)
SSL Certificate
Domain, issuer, expiration, auto-renew flag, hosting provider
ISP / WAN Circuit
Provider, circuit ID, bandwidth, monthly cost, contract end date
Firewall / UTM
Device tracking for perimeter security appliances
LAN Configuration
VLAN, subnet, gateway, DHCP range, DNS servers per site
Backup Configuration
Solution, retention days, RPO/RTO hours, last test result
Vendor Contact / Account
Portal URL, support line, account manager, SLA tier (password encrypted)
Cloud Service / SaaS
Service tier, admin URL, MFA status, data region, contract end (password encrypted)

12 Field Types — Including Encrypted Passwords

Text & Long Text Single-line and multi-line inputs
Number Numeric with validation
Date ISO 8601 with expiry tracking
Select Dropdown with configured choices
Checkbox True / false toggle
URL & Email Format validated on entry
Password AES-256-GCM encrypted
File Attachments with secure download
Tags & Related Items Multi-value and cross-entity references
CSV Import Wizard
Map spreadsheet columns to CI fields in a guided 3-step wizard. Populate entire CI types from your existing documentation in minutes.

Every Asset Linked to Every Risk, Control, and Vulnerability

Assets do not exist in isolation — and in ElectriCISO, they don’t live in isolation either. Link any configuration item to its associated risks, vendor records, physical hardware, and compliance controls. When a finding surfaces, you already know the blast radius.

Global Search Indexed

Every CI instance — including field values — is indexed in global search. Find any circuit, certificate, or credential by any field value without navigating to the CI browser.

Dynamic Column Browser

The CI browser table adapts to the selected type. The columns you set as "show in list" become sortable columns in the table — no configuration beyond the field builder.

CSV Export & Import

Bulk export any CI type to CSV for auditors or spreadsheet reporting. Import from CSV via the 3-step wizard — passwords are excluded from exports for security.

Three Discovery Sources. One Unified Inventory.

Bring your scanner data from any source. ElectriCISO deduplicates across all three discovery channels — ConnectSecure, M365 Intune, and ZIP scanner imports — so every asset appears once, with all its data consolidated. Your inventory stays current without manual work.

ConnectSecure Sync

Native 7-phase sync engine pulls asset inventory, software catalog, and vulnerability data directly from ConnectSecure in one automated operation.

Asset Merge Software Inventory
M365 Asset Bridge

Intune-managed devices from your Microsoft 365 tenant are automatically correlated to the unified asset table using a 4-level device-matching cascade.

Intune Devices MDE Vulns
Scanner ZIP Import

Nessus, Qualys, Rapid7, and other scanner exports feed new assets directly into the inventory. Unified asset matching on hostname and IP prevents duplicates.

Nessus Qualys Rapid7

Know Every Asset. Know Every Risk. Act First.

Stop managing assets in spreadsheets that have no connection to your vulnerabilities, your compliance program, or your risk register. See ElectriCISO’s unified inventory in a live demo.

Book Your Demo