runZero 101 training
This training introduces the core components of the runZero platform. It provides the foundational concepts that help you understand how runZero gathers and structures asset data, how to explore the environment, and how to begin identifying risks and trends.
Each section includes an accompanying walkthrough and links to deeper documentation. runZero 201 covers advanced workflows, automation, and deployment planning.
Platform overview
Before using inventories, findings, reporting views, or dashboards, it’s important to understand the core concepts that shape how runZero organizes and processes data. This section provides short, conceptual introductions to:
- How runZero structures data using Organizations and Sites
- How runZero collects and updates data using Tasks
- How runZero builds unified asset records using Sources and merging behavior
These concepts provide the mental model for everything else in the console.
Organizations and Sites
runZero uses two levels of structure to organize data and control visibility.
Organizations
Organizations define data segmentation and RBAC boundaries. Each Organization maintains its own:
- Assets
- Findings
- Dashboards
- Queries
- Integrations
- Tasks
Use Organizations when you need clear separation between environments (e.g., subsidiaries, departments, or multi-tenant structures).
Sites
Sites represent network structure. A Site corresponds to one or more IP ranges and is used for:
- Assigning assets to a network location
- Generating scan scopes
- Structuring reporting
- Improving segmentation in queries and dashboards
Sites do not define access control. They provide context for how assets are grouped and discovered.
Learn more:
Tasks
Tasks are how data enters runZero. Every collection action in the platform is performed by a Task.
Types of Tasks
- Scan tasks (active discovery)
- Integration tasks (data pulled from external systems)
- Monitor tasks (passive discovery)
Each Task includes:
- Status (success, partial, failure)
- Start and end timestamps
- Asset and service counts
- Link to the associated Explorer (if applicable)
Task results drive inventory freshness, dashboard updates, findings, and search counts. If data appears out of date, the Task history is the first place to check.
Learn more:
Sources and merging
runZero unifies asset data from multiple origins—scans, integrations, and passive monitoring. Each asset may contain attributes from multiple sources, and runZero automatically merges them into a single asset record.
Key concepts
- Source indicators show where an attribute came from
- Conflicting values are resolved using a deterministic merge strategy
- Merging reduces duplicates and consolidates metadata
source:<source-name>filters allow quick pivoting by origin system- Asset details show a breakdown of attributes by source
This merging process enables runZero to act as a single source of truth across your IT, OT, cloud, and security stack.
Learn more:
Inventory views
This section introduces the primary inventory views in runZero and explains how to navigate and interpret them. These views provide the foundation for exploring your environment.
Asset Inventory
The Asset Inventory shows every asset known to runZero across all sources.
Common tasks include:
- Filtering by IP, hostname, OS, software, or exposure
- Identifying device types across IT, OT, IoT, and cloud
- Reviewing asset context such as criticality, ownership, tags, and findings
- Exporting subsets of data for analysis or reporting
Learn more:
Asset detail
The Asset detail page provides a complete, merged view of all metadata for an asset
Key values found on the details page include:
- Attributes from each source
- Services
- Vulnerabilities and findings
- Certificates
- Ownership and criticality
- Historical changes
This is the primary investigative view when troubleshooting or reviewing an asset.
Learn more:
Service Inventory
The Service Inventory provides visibility into every network service discovered through scanning or imported through integrations.
It helps identify:
- Exposed services
- Protocol-level misconfigurations
- Public-facing services
- Administrative or remote access interfaces
Learn more:
Vulnerability & Software Inventories
These views consolidate vulnerability and software metadata across all sources.
Vulnerability Inventory
Shows vulnerabilities identified through:
- Native findings
- Enriched vulnerability data from integrations
- KEV correlation (CISA KEV and VulnCheck)
Software Inventory
Shows discovered software packages and versions, enabling:
- License tracking
- Version drift analysis
- Identifying outdated or insecure software
Learn more:
Findings
Findings identify exposures, misconfigurations, vulnerabilities, and security control gaps. This section introduces how Findings work and how to explore them.
Findings overview
Findings combine multiple signals—including scan data, integration data, KEV enrichment, and novel runZero detections—to provide a high-level view of environmental risk.
Common categories include:
- Vulnerabilities
- Administrative access exposures
- Network misconfigurations
- Missing security controls (e.g., EDR, MDM, VM)
- runZero novel findings (e.g., Widely Shared Private Keys)
Learn more:
Findings detail
The Findings Detail view shows:
- Description and severity
- Evidence from affected assets
- Remediation guidance
- Links to pivot into Asset Inventory, Service Inventory, or Vulnerabilities
Vulnerability detail
The Vulnerability Detail page merges CVE data from all sources and includes:
- CVSS scores and vectors
- CISA KEV and VulnCheck KEV metadata
- Affected assets and services
- Consolidated descriptions and references
Reporting
Reporting views help visualize your network layout, segment boundaries, subnet coverage, and topology.
Switch Topology & Unmapped MACs reports
Switch Topology shows:
- Switches and physical connections
- Link relationships
- Interface details
Unmapped MACs highlight assets communicating on the network but not mapped to switch ports.
Learn more:
Subnet Utilization & RFC1918 Coverage reports
These reports help validate scanning completeness and asset density across subnets:
- Percentage of IP space scanned
- Allocated vs. active subnets
- Hinted assets discovered through passive observations
Learn more:
Network Bridges & Asset Route Pathing reports
These views help understand blast radius and segmentation:
- Network Bridges: Visualize internal and external network connections
- Route Pathing: Understand traversal paths between assets
Learn more:
Custom Asset & Service Attribute reports
These reports allow analysis of:
- Common OS families
- Hardware vendor distribution
- Service protocols
- Certificate attributes
- Custom attributes from integrations
Search, Goals, and Custom Dashboards
Search powers nearly every workflow in runZero. Goals and dashboards allow you to track trends over time and visualize key results.
Query Library
The Query Library stores saved searches for:
- Rapid Response
- Gaps in controls
- Common exposure profiles
- Custom organization searches
Saved searches power:
- Dashboards
- Goals
- Alerts
- Automation via rules
Learn more:
Baseline Goals
Goals measure progress toward internal or external requirements. Examples include:
- Reducing assets missing EDR
- Lowering the count of public-facing services
- Tracking vulnerability remediation progress
Learn more:
Custom Dashboards
Dashboards consolidate searches and metrics. You can:
- Build dashboards per team or use case
- Add widgets from stock or custom searches
- Share dashboards across Organizations
- Recalculate on demand
Learn more:
Custom Dashboard Widgets
Widgets allow visualization through:
- Counts
- Trend lines
- Goal overviews
Widgets can be created from any saved search.
Next Steps
Once you’ve completed this 101 training, continue with:
-
runZero 201 Training
Builds on the foundations covered here with deeper dives into deployment planning, Explorer strategies, advanced search techniques, automation, and workflow optimization. Ideal for admins or operators responsible for maintaining runZero at scale. -
Use Case Library
A collection of short, outcome-focused guides showing how to solve specific problems using runZero. Each use case includes example searches, Arcades, and recommended workflows to apply the platform to real scenarios. -
Playbooks
Step-by-step procedures for executing repeatable security and IT tasks, such as achieving full RFC1918 coverage, identifying gaps in endpoint protection, or preparing for compliance audits. Designed to turn best practices into actionable workflows.
This training provides the foundation needed to operate runZero effectively, investigate assets, interpret findings, and begin measuring and improving your security posture.