- Print
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
Table Name | Description |
---|---|
Cyber Vulnerabilities | The CyberVulnerability object describes the nature and severity of vulnerabilities, risk management, and mitigation strategies. |
Device | The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. |
Device Owners | The DeviceOwners object represents a one-to-many mapping from the device to its owners. |
Organization Hierarchy | The OrganizationHierarchy object represents the organization hierarchy of the employee and its supervisors. |
Software Application | The SoftwareApplication object represents the comprehensive overview of software applications within an organization or environment. |
Software Application Devices | The SoftwareApplicationDevices object represents the one-to-many mapping from SoftwareApplication to its devices. |
Software Application Owners | The SoftwareApplicationOwners objects represent the one-to-many mapping from SoftwareApplication to its owners. |
User | The User object represents the characteristics of a user/person or a security principal. |
Was this article helpful?