LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. 6. Asset Management

6.1 Asset Management

Previous6. Asset ManagementNext6.2 Network Topology

Last updated 9 days ago

πŸ“– Overview

The Asset Management module is the heart of your external surface visibility. It provides a centralized dashboard that continuously tracks, catalogs, and monitors the digital assets you own β€” including domains, subdomains, associated technologies, ports, IPs, and metadata.

Whether you're managing a single website or a complex infrastructure with dozens of services, this module gives you the visibility needed to secure your perimeter.


πŸ“Š What You Can See

Summary Cards:

  • Total Asset (Domain) – Number of discovered domains/subdomains.

  • Technologies – Total count of unique technologies detected across assets.

  • Critical Vulnerabilities – How many unresolved, high-risk findings exist.

Statistics Panels:

  • Asset Statistics – Radar chart showing distribution of technologies, ports, and asset counts.

  • Vulnerability Statistics – Visual classification of detected issues by severity (Critical, High, Medium, Low, Info).


πŸ” Domain Detail Breakdown

Each domain entry provides a comprehensive technical and security profile. You can expand it to view:

1. 🌐 General Information

  • IP address & Port

  • Protocol used (HTTP/HTTPS)

  • ASN & ISP ownership

  • Abuse score

  • Country and geolocation

2. 🧩 Technologies

  • CMS platforms (e.g., WordPress, Plesk)

  • Libraries and frameworks (Bootstrap, Elementor, Google Fonts)

  • Server stack (PHP, MySQL, NGINX)

3. 🧾 HTTP Headers

  • Full response headers (security headers, cache controls, cookies)

4. πŸ” SSL Information

  • Certificate issuer, subject, expiration dates, cipher strength

  • SSL health based on scan engine (e.g., TLS 1.2, weak ciphers)

5. πŸ“‘ DNS Panel

  • A/AAAA/MX/CNAME/NS/TXT records

  • SPF, DKIM, DMARC validation

  • DNSSEC validation state and change logs

6. πŸ†” WHOIS Information

  • Domain registrar

  • Expiration & creation dates

  • Raw WHOIS output

βœ… This level of insight allows you to monitor your assets not just by IP or hostname, but by actual risk, technology, exposure, and ownership.


πŸ” Search & Filter

You can search and filter assets by:

  • Domain name

  • Technology used (e.g., PHP, WordPress, React)

  • Open port (e.g., 80, 443)

This helps isolate vulnerable or misconfigured environments, or group assets by technology stack.


πŸ” Why It Matters

Without visibility, you can't protect what you don't know you have.

The Asset Management module helps:

  • Detect shadow IT (unknown domains or services)

  • Prevent tech stack sprawl and unmanaged exposure

  • Monitor changes in infrastructure over time

  • Serve as a foundation for vulnerability assessment


🧠 Use Cases

Use Case
Result

Discover forgotten subdomains

Avoid exposure of legacy services

Track CMS & plugin usage

Identify outdated or risky versions

Watch SSL expiration dates

Avoid certificate downtime or MITM exposure

Validate security headers

Spot missing XSS/CORS/HSTS protections

Map IP and provider attribution

Detect hosting/ISP changes or anomalies


βš™οΈ Best Practices

  • Run asset discovery scans on a regular schedule (e.g., weekly).

  • Review port usage to detect unexpected exposures (e.g., non-standard ports).

  • Monitor for newly added technologies that increase your attack surface.

  • Combine with Vulnerability Scan (6.3) for actionable insights.


🎯 ShieldsGuard’s Asset Management doesn’t just give you a list β€” it builds a living, evolving picture of your digital perimeter. Know your assets. Reduce your risk. Secure with confidence.