When performing a scan, runZero Explorers and scanners use probes to extract information from open scanned ports. Requirements. runZero supports the three main versions of the protocol: SNMPv1, the SNMPv2c variant of SNMPv2, and SNMPv3. The Tenable Vulnerability Management, Nessus Professional, and Tenable Security Center integrations pull data from the Tenable API, while all. runZero is the first step in security risk management and the best way for organizations to understand their exposure through comprehensive asset inventory. The “last seen” link to the most recent scan details has been restored on the. The automated action can be an alert or a modification to an asset field after a scan completes. Creating an account; Installing an Explorer. All goal types are supported by the robust query language on the backend. Create the body message. The integration will merge existing assets with Falcon data when the MAC address or hostname matches and create new assets where there is not a match. In most cases, you can deploy an Explorer on an existing system that has connectivity to the network you want to discover. - runZero Network Discovery is the most popular SaaS alternative to Angry IP Scanner. By default, Any organization and Any site will be selected. In this article, we compare and contrast several free tools and provide our take on why we believe runZero is best suited for corporate security teams. Platform The Service Graph connector for runZero allows you to bring runZero assets into your ServiceNow CMDB as CIs, and optionally periodically update the CIs with fresh information from runZero scans. Name The Name field can be searched using the syntax. comment:"contractor laptop" comment:"imaging server" Tags Use the syntax tag:<term> to search tags added to an asset. For scanning VMware systems, the best option is to deploy a runZero Explorer inside VMware, on a virtual machine connected to the VMnet you want to scan. Reset password Login via SSO. Provide a Name for the new rule. Command-Line Scanner & Offline Support # This release allows basic inventory to be completed using either an installed agent or the command-line scanner. In our case, we’re interested in Credentials and how they work. He’s here to tell us more about what’s happening with his latest creation, [runZero]. runZero vs CrescentLink. 0 of Rumble Network Discovery is live with support for configurable scan grace periods, data retention policies, additional protocol support, enhanced fingerprint coverage, new search keywords, and much more. In runZero, set up a new organization or project, then go to the inventory, click the Scan button and select Standard scan. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. Click Continue to scan configuration. 0 can be found in our documentation. gz and is written to the current directory. The MAC fingerprint database has been updated using the latest data from the mac-ages project. 2. When viewing assets, you can use the following keywords to search and filter. Step 1: Adding a custom schema Go to Configure > Schemas and select Create New. As you get started with runZero, we recommend kicking off with our standard deployment plan and adding tasks as needed. This helps you track your progress on reducing risk in your asset inventory over time. runZero is the first step in security risk management and the best way for organizations to understand their exposure through comprehensive asset inventory. If you are looking for more to test out after finishing these tasks, you can jump to the deployment plan to dive deeper. Step 2: Choose how to configure the Shodan integration. Previously, he founded the Metasploit Project and served as the main developer of the Metasploit Framework, which is the world's most widely used. As an alternative to Rumble, the Nmap Security Scanner can also identify HTTP/2 implementations via the tls-nextprotoneg NSE. Asset inventory There is a column on the asset inventory page showing the count of vulnerabilities detected by Rapid7 for each asset. +1 for Belarc, especially in environments that use a lot of perpetuals or CD installed crap instead of volume licensing. 0. When viewing the Vulnerabilities inventory, you can use the following keywords to search and filter information. The organization settings page provides three ways to control how runZero manages your asset and scan data. It’s a wingman to our active scanning, providing always-on discovery for devices that might miss active scan windows and coverage for fragile OT environments where active scanning is not permitted. Scans can be performed using only v1/v2, only v3, or both. The runZero platform scales across all types of environments, and works with VM, EDR, CMDB, MDM, and cloud solutions. Click Continue to scan configuration. The organization settings page provides three ways to control how runZero manages your asset and scan data. The runZero Scanner # The command-line runZero Scanner now generates the Network Bridges and Switch Topology reports. It feels so good to be able to finally share the news with everyone! We have been busy reimagining, designing, and building our new brand, and we are excited to be able to unveil it to you today. The default account is a trial of the full runZero Platform. The integration can be set up to support two distinct purposes: Complete asset visibility Targeted alerting and visualization Requirements A Sumo Logic. The Credentials page provides a single place to store any secure credentials needed by runZero, including: SNMPv3 credentials Access secrets for cloud services like AWS and Azure API keys for services such as Censys and Miradore Credentials are stored in encrypted form in the runZero database. runZero supports multiple concurrent users with a variety of roles. Rumble Agent and runZero Scanner now use npcap v0. Source The source reporting the groups can be searched or filtered by name using the syntax source:<name>. runZero is not a vulnerability scanner, but you can share runZero’s. The TCP SYN scanner is now friendlier to stateful firewalls in the network path. runZero's secret sauce is its proprietary unauthenticated scanner powered by high-fidelity fingerprinting. runZero users that have a self-hosted platform or standalone scanner now have the ability to add custom asset and service fingerprints. Centralised dashboards, with. The leading vuln scanner. This training uses the runZero success outcomes to help you understand the top use cases for runZero and how to achieve them. HD Moore is the co-founder and CEO of runZero. The SentinelOne integration can be configured as either a scan probe or a connector task. Scanner release notes Starting with version 1. Podcast Description: “Today’s Soap Box guest is an industry legend – Metasploit creator HD Moore. HD Moore is the co-founder and CEO of runZero. New features # Rumble is now runZero and the product UX has been updated to match. All the ports included in the scan scope with an enabled probe will be sent a request and the response will be collected. View pricing plans for runZero. Setting up the connection between Sumo Logic and runZero requires: Creating a Sumo Logic HTTP Source Creating a runZero alert template Creating a rule in runZero Handling runZero. 0 is now live with alert and asset automation via the Rules Engine, ridiculously fast scans with subnet discovery, cross-organization management via the Account API, support for ServiceNow CMDB integration, an automated query dashboard, self-hosting support, and much more! Read on for the. Keywords and example values are documented for the following inventories: Assets Services Software Vulnerabilities Wireless Users GroupsBug fixes for occasional deadlocks in the runZero Scanner (CLI). Avoid scanning across routed networks (wired and WiFi, multiple VLANs, etc) by deploying additional Explorers. Choose whether to configure the integration as a scan probe or connector task. Rumble Network Discovery is now runZero! Version 1. The edr. As of this evening, the answer is yes. runZero asset data is then imported into the CMDB. What’s new in runZero 3. Add one or more subnets to the Deployment scope. The scan balances SYNs and ACKs and watches for port consumption issues on both the client & target. vendor:oracle. Planning This first set of. Gain essential visibility and insights for every asset connected to your network in minutes. Primary corporate site. Scan probes or connector tasks. Sites can be tied to specific Explorers, which can help limit traffic between low-bandwidth segments. runZero provides asset inventory and network visibility for security and IT teams. Reset password Login via SSO. Run the following. This package has a valid Authenticode signature and can also be verified using the runZero. ID The ID field is the unique identifier for a given template, written as a UUID. Asset discovery is our bread-and-butter at runZero, allowing us to surface network-connected systems and devices to our users. When viewing all tasks, you can use the keywords in this section to search and filter them. Tasks can now be stopped during data gathering and processing phases. The report organizes data from your asset inventory into relevant sections and summarizes the major findings. Professional Community Platform runZero’s query language allows you to search and filter your asset inventory, based on asset fields and values. Here you can browse the solutions to some common runZero issues and the answers to some frequently asked questions (FAQs). In smaller environments, a single Explorer is usually sufficient. 6. runZero's secret sauce is its proprietary unauthenticated scanner powered by high-fidelity fingerprinting. Version 1. The standard deployment plan is broken out into six stages which will help you plan out your requirements, execute the deployment, and optimize your environment based on runZero’s best practices. Network configurations and access Multihomed assets with public and private IP addresses: alive:t AND has_public:t AND has_private:t Multihomed assets connected only to private networks. Your active organization can be switched by. runZero has taken a new approach to CAASM by combining integrations with their own proprietary active scanning and passive discovery technology to deliver. runZero scales across all types of environments, and works with EDR, VM, CMDB, MDM, and cloud solutions. Coverage reports help you understand potential blind spots on your network by identifying which IP spaces have been scanned, which ones contain assets, and which ones still are unknown. The scanner has the same options and similar performance characteristics to the Explorer. The overall detail runZero provides is unmatched and it’s given us insights into devices that other asset discovery products haven’t. io or Tenable Nessus and bring your vulnerability scan results into runZero to achieve better visibility of gaps in your scan coverage. No agents, credentials, traffic captures,. You can either configure Credentials on a scan basis or add them to the organisation so they can be reused for multiple scans. The runZero scanner now reports legacy RDP authentication, decodes additional ISAKMP/IKEv2 fields, and improves the. Collecting the necessary performance statistics, log files, system configuration, and profile debug capture was difficult for customers since there are many different commands and files involved. io or Tenable Nessus and bring your vulnerability scan results into runZero to achieve better visibility of gaps in your scan coverage. Although Windows binaries have a valid Authenticode signature, all binaries also contain a secondary, internal signature. runZero has brought to market a new version of its cyber asset attack surface management (CAASM). Combined, these updates can shine a light on misconfigured network segmentation and help identify. Overall: Excellent overall. The speed of the scans and the accuracy of results are stupendous. Another key value-add that the team. Step 1: Scan your network with runZero. 3. Add a template by selecting Tasks > Templates from the side navigation and then click. 1. Lastly, you will query asset data to find assets that are not being vulnerability scanned. Sign up for a runZero account Activating your account After you sign up for an account, we’ll email you a link to activate your account. Adding custom asset sources can be accomplished through the API or by leveraging the runZero Python SDK. Each time a scan runs using values from a template, the scan task is saved with a copy of the parameters. They discussed the challenges, rewards, and lessons learned from their work building network scanning technology. Rumble Network Discovery 2. Note that event records are retained for one year. The runZero Export API uses the same inventory search syntax to filter results. In runZero, user groups explicitly set the organizational role and determines the tasks users can perform within each organization. Subscribe to the runZero blog to receive updates about the company, product and events. nessus) from the list of import types. runZero is not a vulnerability scanner, but you can share runZero’s results with your security team for investigation and mitigation. Deploy runZero anywhere, on any platform, in minutes. UDP service probes can be enabled or disabled individually. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. Podcast Description: “This week’s sponsor interview is with HD Moore. If you don’t see an. This integration brings runZero data into ServiceNow, allowing for specific fields and CI class mappings to be fine-tuned from the ServiceNow console. The NTLMSSP response is available through any NTLM-enabled service: SMB, RDP, and MSRPC, and sometimes HTTP servers. The scanner now reports Tanium agent instances on the network. runZero is a comprehensive cyber asset attack surface management solution with the most efficient way to full asset inventory. It is also possible for Chrome to fail to run for other reasons, such as a corrupt Chrome profile. 0/8, 172. 8,192. runZero treats assets as unique network entities from the perspective of the system running the Explorer. After announcing v1. Connector tasks run independently from either the cloud or one of your Explorers, only performing the integration sync. 5 of the Rumble Agent and runZero Scanner. Go to Alerts > Rules and select Create Rule. Step 2: Configure the runZero Service Graph Connector in ServiceNow. 0, MFA via WebAuthn, and access to a limited version of the command-line runZero Scanner. You can discover your entire inventory including managed and unmanaged devices, on-premises. runZero's secret sauce is its proprietary unauthenticated scanner powered by high-fidelity. The Your team menu entry has four submenus. Scanning your AWS assets with runZero will merge the scan results with the AWS attributes, giving you one place to look when you. Network discovery tools, like runZero, look at other sources, such as SNMP community strings and ARP caches. Instead, you deploy runZero Explorers to carry out scan operations. Pros: Runzero is an exceptional asset discovery tool that allows us to easily discover/track assets, while providing excellent insights into missing AV products or any assets with. In order to detect assets containing outdated. ( Note: much of the host information provided by Tenable. 9 Ratings Breakdown 5 ( 34) 4 ( 3) 3 (. 2. After deployment, you can manage your Explorers from the Deploy page in your runZero web console. With this add-on, you’ll be able to pull new or updated hosts into a Splunk index, where you’ll be able to analyze, visualize, and monitor them there. 0. Step 3: Identify and onboard unmanaged assets. 11. x versions on any TLS-enabled ports identified during a normal scan. runZero. runZero is not a vulnerability scanner, but you can share runZero’s results with your security team for investigation and mitigation. Self-hosted The self-hosted version runZero allows you to run the entire platform on-premises or within your own cloud environment. SNMPv1/v2 scanning A discovery scan finds, identifies, and builds an inventory of all the connected devices and assets on your internal network. All runZero editions integrate with Sumo Logic to enrich asset visibility and help you visualize your asset data. 15. runZero users that have a self-hosted platform or standalone scanner now have the ability to add custom asset and service fingerprints. We want to share the magic of great network discovery with. runZero is a cyber asset attack surface management solution that delivers full cyber asset inventory–quickly, easily, and safely. 6 2020-05-14 Corrects inconsistent use of the new service attributes when processing the dynamic MAC address filter. Unauthenticated network discovery tools # When viewing scan templates, you can use the keywords in this section to search and filter. TroubleshootingDiversity, equity, and inclusion at runZero. runZero Enterprise customers can now sync assets from Microsoft Intune. jsonl files from runZero that have been uploaded into your AWS S3 bucket. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT. One of the trickiest parts of network discovery is balancing thoroughness with speed. runZero scales across all types. runZero Scanner; Rumble Agent; Excited about the new features? Sign up for a free trial and give this release a spin! Written by HD Moore. After checking permissions and. However, there may be times when the traditional deployment model may not work for you. In a new or existing scan configuration: Ensure that the NESSUS option is set to Yes in the Probes and SNMP tab and change any of the default options if needed. runZero Enterprise customers can now import assets from custom sources using the runZero SDK. On the import data page: Choose the site you want to add your assets to, and. This document describes a few of them, with suggestions on how to reduce duplication. After a successful sync,. The user interface is still far from perfect, but an effort was made to reclaim screen real estate for what matters most; your network assets. 9 all release notes have been consolidated into one page. For example, if you only want to export iLOs that have the ProLiant DL360p. runZero scans can be performed with the following SNMP configurations: SNMPv1 and SNMPv2. Protocol support has been added for Brother’s proprietary scanner protocol, allowing us to identify Brother scanners or Brother multi-function devices that include a. gz can be uploaded to the runZero Console through the Inventory Import menu. The self-hosted runZero platform must be updated prior to first use. 8 2020-05-23 Fingerprint updates. runZero documentation; Getting started. The timestamp fields, created_at and updated_at, can be searched using the syntax created_at:<term> and updated_at:<term>. What UDP ports does runZero scan? runZero scans the following UDP ports by default: 53 69 88 111 123 137 161 443 500 623 987 1194 1434 1701 1900 2049 2228 3391 3671 3702 4433 5060 5246 5349 5351 5353 5632 5683 5684 9302 10000 10001 11211 19132 30718 37810 41794 46808 47808 48808 65535. 168. sc) by importing data from the Tenable Security Center API. The site import and export CSV format has been simplified. runZero is a cyber asset attack surface management solution that is the easiest way to get full asset inventory with actionable intelligence. io integration will pull runZero asset data from. Step 3: Choose how to configure the SentinelOne integration. runZero includes a standalone command-line scanner that can be used to perform network discovery without access to the internet. Start your 21 day free trial today. Platform runZero is able to help users track ownership with the ability to configure different types of owners and assign owners to runZero assets and vulnerability records. Fresh on the heels on Beta 3, we are excited to announce support for the Apple macOS platform. runZero provides asset inventory and network visibility for security and IT teams. Used to scan a fairly large network (/8) and the intel it gathers has become vital to my groups ability to not only identify issues proactively, but also respond quicker to events. runZero’s SSO implementation is designed to work with common SAML providers with minimal configuration, but there are a few requirements:. After deploying runZero, just connect to Tenable. 0/16 subnet is no longer ignored when processing scan results. 5. Rumble Network Discovery is now runZero! We rolled out support for automatic web service screenshots this morning in both the Rumble Agent and the runZero Scanner (v0. runZero can also find gaps in your vulnerability scan coverage by identifying assets that have been discovered by runZero but. Whether you use the Rumble Agent or the runZero Scanner, the scan engine improvements in v1. After the trial expires, you will have the option to convert to the free Community Edition. If you want to refine the results in your exported data, you can filter the inventory first. Configurable max group size that limits the number of targets runZero can scan at once, which correlates to the number of connections stateful devices such as firewalls or routers. The 169. Manufacturing plant that is not connected to the corporate networks. 2. runZero uses a combination of unauthenticated, active scanning and integrations with cloud, virtualization, and security infrastructure to provide full visibility into IT, OT, cloud, and remote. This version increases the default port coverage from 100 TCP ports to more than 400, while also supporting. 5 capabilities. The runZero Scanner documentation has been updated to match. Vulnerability scanning plays a crucial role in any enterprise security program, providing visibility into assets that are unpatched, misconfigured, or vulnerable to known exploits. However, heavily segmented networks may require the deployment of multiple scanners. 7. If you would like to tie an Explorer to a site. The scanner now reports additional detail for SSLv3 services. The platform can scan and identify devices running Windows, macOS, Linux, and various network devices, ensuring a comprehensive view of an organization’s assets. 0. runZero provides asset inventory and network visibility for security and IT teams. Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong. runZero is the only CAASM solution that unifies proprietary active scanning, native passive discovery, and API integrations. 19041; this can refer to either the workstation OS (Windows 10) or the server OS (Server 2019), and telling those apart is a challenge on its own. Best for: users looking for a commercial solution to monitor open. We strive to provide a fast, low-impact scan by default, but also try to include as many services and protocols as possible. Add a. After deploying runZero, just connect to Tenable. It packages a ton of HD’s pentesting parlor tricks gleaned from his research and pentesting experience into a user-friendly UI and makes use of the open source recognition fingerprinting database to provide fast,. email:john@example. Setting up a connector will work if you’re self-hosting runZero or integrating with Tenable Vulnerability Management. By default, data is retained for one year in the runZero Platform. Therefore an address like 10. runZero is the first step in security risk management and the best way for organizations to understand their exposure through comprehensive asset inventory. Previously. Vulnerability scanning plays a crucial role in any enterprise security program, providing visibility into assets that are unpatched, misconfigured, or vulnerable to known exploits. RunZero . 3. Corporate network Explorer that is able to get all on-premise networks. The. Protocol support has been added for Brother’s proprietary scanner protocol, allowing us to identify Brother scanners or Brother multi-function devices that include a scanner. Use the syntax id:<uuid> to filter by ID field. The scanner reads the Avro files specified, and writes a file in runZero scan format containing the appropriate host records. To follow along with the hands-on portions, you can either: Use your company’s existing runZero implementation as a reference to see what was done, or Set up a personal runZero account to scan your home network Introduction. In either case, you’re given a. From the scan configuration page: Choose US – New York as the Hosted zone (this is a runZero-hosted Explorer in the cloud). It scales from home use to Fortune 50 companies. The differences between the Explorer and scanner are highlighted below. A ServiceNow ITOM. Before you can set up the AWS integration:No credit card or sales call required. About runZero. Discover every asset–even the ones your CMDB didn’t know about. The Asset and Service exports now include the service. Step 2. Scan range limit (8,192) Scan rate limit (5,000). Previously, he founded the Metasploit Project and served as the main developer of the Metasploit Framework, which is the world's most widely used penetration testing framework. Community Platform runZero integrates with Splunk using a dedicated Splunk Addon, compatible with Splunk 7, Splunk 8, and Splunk Cloud. 4 and above' and is a IP Scanner in the network & admin category. x updates, which includes all of the following features, improvements, and updates. Dan Kobialka September 27, 2023. Discover managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. November 9, 2023. Angry IP. Just deploy the runZero Explorer (a lightweight scan engine) to carry out scan operations and upload data to the console. Select Configure Rule. Reviewer Function: Research and Development; Company Size: 50M - 250M USD; Industry: Software Industry;. runZero includes a query library of prebuilt searches which can be browsed from the Queries page. Platform Only runZero administrators can automatically map users to user groups using SSO attributes and custom rules. Read MoreThis limits the number of targets runZero can scan at once, which correlates to the number of connections the router sees. On the import data page: Choose the site you want to add your assets to, and. We strive to provide a fast, low-impact scan by default, but also try to include as many services and protocols as possible. SaaS or self-hosted: choose the deployment model that works for you. Platform runZero Platform integrates with ServiceNow Configuration Management Database (CMDB) through a runZero JSON endpoint, with asset data formatted as CMDB Configuration Items (CIs). You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. Breakdown Scanner Explorer Summary runZero’s command-line scanner can perform network discovery without access to the internet. The quick start path is recommended for testing out runZero. Quickly deploy runZero anywhere, on any platform, in minutes SaaS or self-hosted: choose the deployment model that works for you. Pros: Flexibility of deployment, the scanners can run on any platform or hardware. Scan templates can be created in a few ways in runZero: By going to Tasks > Task libraryCompletion of the runZero 101 training is also recommended so that you understand the context behind all of the administrative actions you will learn about in this training. On the Windows platform, the Rumble Agent and runZero Scanner now bundle npcap 1. Requirements A Panther account with the required permissions, An AWS S3 bucket, and Exported . The standard deployment plan is broken out into six stages which will help you plan out your requirements, execute the deployment, and optimize your environment based on runZero’s best practices. Concurrent scans: Conduct concurrent scans on the same Explorer (not available on Windows). We do our best to ensure that any data gathered, transmitted, or downloaded is easy to view, import, export, and reprocess. The site configuration allows a default scan scope to be defined, along with an optional list of excluded scan scopes. Organizations can use the runZero Platform to protect their managed and unmanaged devices,. The Tenable Vulnerability Management, Nessus Professional, and Tenable Security Center integrations pull data. Error: Enable cookies in your browser to continue. Data expiration is processed as a nightly batch job based on the current settings for each organization in your account. When viewing saved queries, you can use the keywords in this section to search and filter. Discovering IT, OT, virtual, and IoT devices across any type of environment is simple with runZero's active. However, there may be times when the traditional deployment model may not work for you. Release Notes # The complete release notes for v1. . Activate the Microsoft 365 Defender integration to sync your data with runZero. This is newline-delimited JSON – JSONL – that represents the unprocessed output of the scan engine. Deploy Explorers: runZero Explorers are the scanners. runZero is the only cyber asset attack surface management ( CAASM) solution that unifies proprietary active scanning, native passive discovery, and API integrations to deliver the most complete coverage across managed and unmanaged devices, including the full spectrum of IT, OT, IoT, cloud, mobile, and remote assets. To use a hosted scanner, set your Explorer to None and select a hosted zone during the scan. We were able to update the scan engine quick and this feature is now included as of release 1. Beta 4 is Live! # This release includes support for macOS agents and scanners, web screenshots, and major improvements to the user interface. runZero’s vulnerability management integrations let. This feature can be toggling. An organization can automatically create a. Prerequisites Prior to starting this training, we have two recommendations: Superuser access to a runZero account. Although Windows binaries have a valid Authenticode signature, all binaries also contain a secondary, internal signature. Credential fields Credential ID The ID field is the unique identifier for a given credential, written as a UUID. Alternatively you can specify an output filename with the --output-raw option, as if performing a runZero scan. Finding externally exposed assets # Rumble Enterprise customers using the cloud-hosted platform can now scan external assets easier than ever. runZero includes a standalone command-line scanner that can be used to perform network discovery without access to the internet. runZero currently supports Internal, Email, and Webhook channel types. 0 of Rumble Network Discovery is live with a handful of new features. runZero has brought to market a new version of its cyber asset attack surface management (CAASM) platform that combines "proprietary active scanning, native passive discovery and API integrations," the company announced this week. You can use the Mustache syntax for the subject. To work around this issue, we have provided a shim MSI package that can be used with automated installers. Email Use the syntax email:<address> to search for someone by email address. An asset may have multiple IP addresses, MAC addresses, and hostnames and it may move around the network as these attributes are updated. We’re still the same company, with the same people and mission; we just have a new name and. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. IP Scanner is described as 'for Macintosh scans your local area network to determine the identity of all machines and internet devices on the LAN. We want the email to tell us how many new, online, offline, and modified assets there are, as well as.