Skip to content

Add and Manage

Adding, Editing, and Managing Your Digital Assets

Navigate to the Asset Management section and select “Add Asset” from the primary navigation menu. The system presents asset type cards—choose the appropriate category for your new asset.

Step 1: Asset Classification Select the specific asset type from the available options. This choice determines what information fields you’ll need to complete and how the platform will monitor this asset.

Step 2: Criticality Assignment\nChoose the appropriate priority level (High, Medium, or Low) based on the asset’s business importance. This decision impacts monitoring frequency and alert prioritization.

Step 3: Asset Information Complete the required fields specific to your asset type. For domains, provide the full URL; for IP addresses, enter the complete address; for brand names, specify the exact terminology requiring protection.

Step 4: Contextual Relationships Link related assets to create contextual understanding. For example, connect a domain to its associated IP address, or link a brand name to its primary website. These relationships help the platform understand attack vectors and provide comprehensive protection.

Step 5: Validation and Activation Review your entries for accuracy before clicking “Add Asset.” The platform immediately begins monitoring your new asset according to its assigned priority level.

Asset information evolves—domains change hosting providers, IP addresses get reassigned, and business priorities shift. The edit function allows you to update asset details, modify criticality levels, and adjust monitoring parameters without losing historical data.

When assets become obsolete, proper deactivation maintains system efficiency and reduces false positives. Deactivated assets remain in your inventory for historical reference but stop consuming active monitoring resources.

Consider deactivation for expired domains, decommissioned servers, discontinued products, or assets transferred to other organizations. This practice keeps your active monitoring focused on current business-critical assets.

For organizations with extensive digital footprints, bulk operations streamline asset management. Import multiple assets simultaneously, apply consistent criticality levels across asset groups, and manage large-scale changes efficiently.

Regular inventory reviews help identify assets requiring updates, redundant entries needing consolidation, and new assets requiring addition to maintain comprehensive protection coverage.