Task: CPE-based Inventory
CPE stands for Common Product Enumeration. It is a structured naming scheme for information technology systems, platforms, and packages.
In other words: CPE provides a unique identifier for virtually any software product that is known for a vulnerability.
Execute CPE-based Inventory
The inventory is assembled based on an arbitrary security scan. For any product that it finds, the task tries to find the corresponding CPE identifier.
This means that the more comprehensive and the more in-depth a scan configuration is, the more products could be identified.
In case the detection efficiency should be increased by applying local security checks it is required to configure remote access via the "Credentials" feature. If not done yet, create a corresponding user account on the Windows systems (a low privileged user account is sufficient).
Define the target systems (targets) and, if applicable, choose the respective credentials.
Now you can create the actual task. This means to combine a scan configuration (e.g. "Full and Fast") with the newly created targets.
The scan is started by clicking on of the respective task. It can take a while for the scan to complete. To update the view with the current progress, click on .
As soon as the status changes to "Done" the complete report is available. At any time you can review the intermediate results.
To only show the results of the CPE inventory, you can apply a suitable filter (search text "CPE" and Threat category "Log").
Here is an example for a Windows XP system.