Attack Surface: Third Party Assets Ingrid The Third Party Assets page [ Attack Surface ➔ Third Party Assets] in the Security Posture Management application shows third-party assets (IP addresses and domains), providing a resilient view of your extended attack surface. Identify and prioritize the most critical assets within your third-party ecosystem. Quickly surface the risk you care about to third parties. Easily access your most important third-party assets all in one place. Actions Download Third Party Assets Data Download the Third Party Assets data (.csv). Instructions: Select the Download option at the top-right of the table. Filter the Data Instructions: Use the filter options on the left. Search Assets Instructions: Use the search bar at the top-right to search by country, company name, and asset (name). Unmonitor Assets Instructions: Use the Checkboxes to the left of the assets in the table to select assets ( selected). Select the Unmonitor button at the top of the table. Select the Yes checkbox to confirm and proceed with unmonitoring the selected assets. Select Unmonitor. Upload Assets to be Monitored Upload assets to be monitored in bulk. By uploading your file you agree to the Bulk Monitoring Disclaimer. Instructions: Create a CSV file listing third party assets. Include the following columns with a maximum of 500 rows: asset = Identify the asset by IP address or domain name. company-guid [entity_guid] = Identify the company that should be attributed to the asset by their unique identifier. See GET: Portfolio Details. Select the Upload Assets button at the top-right of the page. Upload the file (drag & drop or select from your directory). Select Continue. Vulnerability Evidence Details View the Vulnerability Evidence Details sheet. Instructions: Select an asset from the table. Fields Asset The name of the asset. Asset Type The type of asset. Company The company that owns the asset. Country The country where the asset resides. Findings The number of findings in the asset. Importance The asset importance. Material/Severe Findings The number of material and severe assets. Filters Asset Type Filter by asset type. Values: See asset types. Importance Filter by asset importance. Values: See asset importance. Number of Findings Limit by the number of findings. Values: The minimum & maximum number of findings to include. March 19, 2026: Security Posture Management rebrand. February 4, 2025: Published. Related articles Attack Surface: Infrastructure Infrastructure: Assets Ratings Algorithm Update – July 10, 2025 TLS/SSL Configuration Findings Dynamic Remediation: Rescan User Experience Improvements — February 28, 2025 Feedback 0 comments Please sign in to leave a comment.