Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

Purpose

Agent Configuration

Company

Introduction

Purpose

Agent Configuration:

1. Installation Procedure

Company System Registration

Go to <URL>. Go to <tab>

Click on the ‘+’ button in the Company dashboard. Enter the Company Name, Agent Name, and the Company Description (optional).

You have successfully created the company.

Agent Installation

Download and Install the NetalyticsAgent.exe file.

Enter Server and Site ID for a successful installation

Note: Click on Continue without Agent installation button, If not willing to wait for registration

2. Scan all agent subnets

Will have an option to scan all agent subnets without providing subnet details in portal prior to agent installation, 

  1. You will receive an mail on a successful installation.

  2. Have an option to download Server and Secret code for hassle-free entry

3.Agent Configuration

Download and Install

Click on “Settings”-> “Downloads”

Download Agent and run the exe. Agent will get installed.

Image RemovedImage Added

Windows Protect your PC

Open the installed agent and select More info in Windows Protect your PC page. Select Run anyway to install the agent

License Agreement

You will find a popup screen asking permission to install Netalytics Agent. Click on YES and Select the radio button To  accept the agreement option in the License Agreement popup and Click next for the further steps

Provide the destination location in which you would prefer to save the agent in Select destination popup screen. Once the path is defined, click on Next for the Agent configuration.

Note: By default system suggests “C:\Program Files (x86)\NetalyticsAgent “ this path to save the agent.

Key-in the Server and Secret code details optioned from Configuration information during Agent installation.

Finish the Installation by agreeing the terms and conditions

4.Asset Configuration

Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets. 

  1. If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.

  2. On providing Static IP, the system scans the Vulnerabilities in that specific system.

  3. If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company  

To initiate the configuration

Step. 1: Select the CIDR | IP Range | Static IP

Save the IP address

Step 2: Save the IP Address

Step 3: Add Master Credentials

At this stage, you can specify the master credentials or just skip and finish the installation.

Note: Credentials can be added before you initiate the Vulnerability scan.

 

5.Summary

Once the configuration is successfully completed, the System generates an overall summary report on overall system specification

Click on the finish button and now the system is ready to scan Vulnerabilities

 

Company

Once Agent is installed successfully, click on the Company Icon on the Global tab and select the Created company for further process.

Image RemovedImage Added

Click on the Company Name, The page will get redirected to the company Dashboard.

Once entered the page, will be able to view Company Dashdashboard, Assets, Vulnerabilities, Compliance, Audit Log and Report Tables

Image RemovedImage Added

In the settings tab: Select Jobs to view the number of devices discovered in the specified range during Agent Installation, any failed jobs, and the status of Agent Configuration.

Image RemovedImage RemovedImage AddedImage Added

Select Discovery Tab: Have 4 credential options

1.SNMP Credentials: If SNMP credentials specified and saved during agent installation, The agent will automatically scan the network devices, as specified below.

Image RemovedImage Added

2. IP Ranges: We have 3 types of IP ranges, CIDR, IP Range, and Static IP. Click on IP Range Type and select CIDR in the drop-down to specify start IP and IP range type and save to view

IP Ranges: CIDR

Step 1:

Click on + button to select the type of CIDR in the drop-down

Step 2:

Enter the IP range for which intended to discover and save

Step 3:

Select the IP ranges and Click on Start scan to discover the select IP ranges.

IP Ranges: IP Range

Step 1:

Click on + button to select the type of IP range in the drop-down

Step 2:

Select the type of IP range and enter the IP range for which intended to discover.

Step3:

Select the single or multiple IP ranges and click on Start Scan to discover the IP range.

IP Ranges: Static IP

Step 1:

Click on the + button, and select Static IP to Scan Single device.

Step 2:

Enter static IP and save

Step 3:

Select the static IP and click on Start Scan to discover the static IP.

Active Directory Credentials:

Step 1:

Click on + button to enter the AD credentials

Step 2:

Fill in the required details and click on Save Credentials to save.

Step 3:

The screen will reflect the AD credentials ready to scan.

Note: If AD credentials specified during network discovery, System will verify and Scan the AD devices automatically.

Master Credentials:

Step 1:

Click on + button to start entering the Master Credentials

Step 2:

Fill In the required fields and enter save

Step 3:

Master credentials successfully added.

Note: If Master credentials available during network discovery, System will verify and Scan the AD devices automatically.

Assets: Will be able to view details pertaining to the devices discovered during agent installation,

Image RemovedImage Added

Will be able to perform many other actions when clicked on the action drop-down.

  • Edit:

    • When selected, We will be able to change the OS Type and Host IP and will be able to specify the criticality of the device scan.

    • Can enter the Tag Name as per the specifications described in the Popup. this is can be considered during the Patch update.

    • We can add the credentials of the device details such as User Name, Password, Domain name, and Port details of the device.

  • Details: Can view 3 categories of details such as Device Details, Vulnerabilities, and CIS Compliance

    • Device Details: will be able to view complete device details such as

Device Details

  • Device Info

  • Vulnerabilities Score

  • Vulnerabilities

  • Severity to CVSS score

  • Ports open

  • External Vulnerabilities

  • Compliance

  • SNMP

  • UPNP

  • SMB Shares

  • Zero Config

  • HTTP Data

  • Available patches

  • Installed software

  • Vulnerabilities: Under Vulnerabilities, we can view Authenticated and Unauthenticated Vulnerabilities.

    • Authenticated Vulnerabilities: This will be reflected once the specified device completes the Vulnerability scan.

    • Unauthenticated Vulnerabilities: This will be refected once the device discovery is completed.

  • CIS Compliance: This will be reflected once the specified device completes the compliance scan.

  • Vulnerability Report: Will be able to view the report pertaining to the complete Vulnerabilities of the device.

  • Compliance Matrix:

<<Need clarification >>

  • Compliance Report: Will be able to view the report pertaining to the complete Compliance of the device.

  • Image RemovedImage Added
  • Delete: Will be able to delete single or multiple assets at one go.

Global Actions: Under Assets,

When global action is selected for specific assets. below mentioned can be viewed in the global action dropdown

select a specific device and click on global action to get a drop-down with actions such as Assets scan, Add Tag, Vulnerability Scan, Windows Packages Scan, Compliance Scan and Delete.

  • Assets Scan: Discovery of the selected device can devices will be initiated when clicked on this button.

<< Need Clarification >>

  • Add Tag:

Step 1:

Image Added

Select Add tag

Step 2:

Image Added

Enter the required details

Note: Tag Name entered is considered during the Patch update. (Name mentioned is for reference only)

Step 3:

Image Added

After a successful update, will get a confirmation pop-up

  • Vulnerability Scan

Step 1:

Image Added

Select the device → click on Global action → select Vulnerability scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Step 3:

Image Added

Once the system verifies credential and other required details in the backend will receive a status popup.

  • Windows Packages Scan

Step 1:

Image Added

Select the device → click on Global action → select Windows Packages scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Note: Can check the data related to Windows Packages Scan in Reports.

Compliance Scan

Step 2:

Image Added

Select the device → click on Global action → select Compliance scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Step 3:

Image Added

Once the system verifies credential and other required details in the backend will receive a status popup.

Note: Can check the data related to Windows Packages Scan in Jobs

  • Delete

Company Vulnerabilities

In this category will be able to view the Active and Suppressed Vulnerabilities data with reports related to each specific.

Image Added
  • Active Vulnerabilities

The system scan analyzes and displays OS wise asset vulnerabilities related to the selected company. The system further segregates the Vulnerabilities into Critical, High, Medium and low priorities. list of the Vilnerabilites can be viewed by clicking on the linked numbers under each category.

Critical

Image Added

High

Image Added

Medium

Image Added

Low

Image Added

  • Suppressed Vulnerabilities

Admin has the rights to suppress the active Vulnerabilities based on the business rules of the company. The Suppressed Vulnerabilities can be viewed under this category.

Image Added

Assets Compliance

This category will be able to view the Active compliance rules which include compliant and non-compliant rules.

Image Added

Operating System wise Compliant

Image Added

Non Compliance:

Image Added

Audit Log

Dashboard: In Dashboard, we will be able to see the stats of the Company/Range that was specified during Agent Installation.