Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents


Getting Started

...

ConnectSecure has already signed you up for the new instance.

Please check Inbox for an email that looks like below:

Image Removed

Please Image Added

To log into the portal please click on the URL in this mail and log in using the username and password given in the mail.portal link as shown in the picture above. Activate the user by following the instructi

Two-factor Authentication

Once entered username and password is entered, you will be redirected to set up authentication

...

Once the authentication is set, you will be directed redirected to the portal.

Please proceed to creating a new company

...


Once the company is created, proceed to configure Discovery Settings and Credentials. This section will guide one through is an easy guide to the process.


...


...



Access Discovery Settings:

...

Navigate to the “Agents” section and click on "Download Agent".

...

Image RemovedImage Added


Copy the script by selecting the "Copy to Clipboard" option.

...

Similarly, map the necessary Credentials to the agent by choosing the relevant credentials from the list.

Image RemovedImage Added


Once you have mapped the Discovery Settings and Credentials, click the "Save" button to apply the changes.

...

For network vulnerabilities, we can find scripts to remediate them.

Image RemovedImage Added


We can directly copy the script and run it on the machine for remediation.

...

In this section, we can identify all the problems related to assets at the company level.

Image RemovedImage Added

In this section, we can suppress Problems, triggering an email to the designated user for approval. This user can be internal or external.

...

Click on 'Assets' to access the Remediation Plan.

Image RemovedImage Added

The Remediation Plan lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.

Image RemovedImage Added

Application Vulnerabilities

Click on 'Assets' to access the Application Vulnerabilities.

Image RemovedImage Added

In this section, we can find the Application Vulnerabilities and missing OS (Operating System) security patches.

Image RemovedImage Added

Pending OS Patches

...

In this section, we can review the pending OS patches across the company's view.

Image RemovedImage Added

Ports

Click on 'Assets' to access the Ports section.


In this section, we can review the Ports details across the company's view.

Image RemovedImage Added

Anchor
_Toc1037062264
_Toc1037062264
Anchor
_Toc361142251
_Toc361142251
Vulnerabilities

...

In this section, we can access compliance details for CIS, PCIDSS, HIPAA, Cyber Essentials, NIST 800-53, Essential Eight across multiple platforms such as Windows Server, Azure Server, Windows Desktop, Linux, and Mac.

Image RemovedImage Added

And for Manual Compliance, we can upload evidence to mark it as compliant or not applicable.

Image RemovedImage Added

Active Directory

...

Click on “Active Directory” to access the Active Directory Section.

Image RemovedImage Added


Here we can find:
Problems
Identifies and lists issues or challenges.

...

Provides a summary of Active Directory-related information.

Image RemovedImage Added

Azure AD Summary

Offers a summary of Azure Active Directory-related information.

Image RemovedImage Added

Active Directory: Presents detailed information and insights related to the Active Directory.

...

Azure Active Directory: Provides detailed information and insights concerning Azure Active Directory.

Image RemovedImage Added

Microsoft Secure Score: Offers information and metrics related to the security score assigned by Microsoft, indicating the overall security posture.

Image RemovedImage Added

PII Scan

Click on “PII Scan” to access the PII Scan Section.

Image RemovedImage Added

Add a scan profile

Click on +Add to add a new scan profile.

Image RemovedImage Added

Scan settings

Scan Settings lets you choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, SSN, and Street.

Image RemovedImage Added

Select Default Extension

Select the Default Extension Type Select All option. Users can select optional extension types html, json, yaml, yml, tex, xml, ts, sh, wpd, php, go, cpp, c, js, xlsm.

Image RemovedImage Added

Select the appropriate Source Type and an Agent to use for PII Scan.

...

Once the scan is complete, review the results to identify any flagged Personally Identifiable Information. This may include names, addresses, social security numbers, or other sensitive data.

Image RemovedImage Added

Based on the scan results, take appropriate actions. This could involve redacting or encrypting sensitive information, notifying relevant parties, or implementing additional security measures.

Image RemovedImage Added

Clicking on the highlighted PII data will redirect you to the detailed view of the chosen PII data.

...

After choosing the desired dashboard type, the system will display the corresponding information. Explore the various components and visualizations to gain insights relevant to your needs.

Image RemovedImage Added