Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Domain Name: Include domain names for comprehensive coverage.

...


Save Changes: After adding credentials and configuring discovery settings, save the changes to apply the new configurations.

...

Verify Credentials: Once credentials are added, perform a verification to ensure they are valid and can be used for scanning.

Choose an OS type to add master credentials: Windows, MacOS, Linux, VMware, and Network devices.

Depending on the network setup, select either Active Directory or Asset Credential as the credential type.

...



...

Agent Installation

Navigate to the “Agents” section and click on "Download Agent".

...

Click on 'Assets' to access the Pending OS Patches.

...

In this section, we can review the pending OS patches across the company's view.Image Removed

...

Ports

Click on 'Assets' to access the Ports section.
In this section, we can review the Ports details across the company's view.

Image Removed

...

Vulnerabilities

Go to the 'Company View'.

Click on “Vulnerabilities” to access the Vulnerabilities view.

...

In this section, we can suppress vulnerabilities, triggering an email to the designated user for approval. This user can be internal or external.Image Removed

...

Select the reason for suppressing the vulnerability.

User Type: Choose the user type for whom the suppression request is intended: Internal User or External User.

Suppression Comments: Provide comments explaining the justification for suppressing the vulnerability.

Suppression Start Date and End Date:

Specify the start and end dates for the vulnerability suppression.

Image RemovedImage Added

Save: Click the "Save" button to approve the suppression request.

...

Compliance

Go to the 'Company View'.

Click on “Compliance” to access the Compliance view.

In this section, we can access the compliance details for CIS, PCIDSS, HIPAA, Cyber Essentials, NIST 800-53, Essential Eight across multiple platforms such as Windows Server, Azure Server, Windows Desktop, Linux, and Mac.

Image RemovedImage Added

And for Manual Compliance, we can upload evidence to mark it as compliant or not applicable, there are provisions to upload evidence.Image Removed

...

Active Directory

Click on “Active Directory” to access the Active Directory Section.

Image Removed

...


Problems
Identifies and lists issues or challenges.

...

AD Summary

Provides a summary of Active Directory-related information.Image Removed

...

Azure AD Summary

Offers a summary of Azure Active Directory-related information.Image Removed

...

Active Directory: Presents detailed information and insights related to the Active Directory.

...

Azure Active Directory: Provides detailed information and insights concerning Azure Active Directory.Image Removed

...

Microsoft Secure Score: Offers information and metrics related to the security score assigned by Microsoft, indicating the overall security posture.

Image RemovedImage Added

PII Scan

Click on “PII Scan” to access the PII Scan Section.Image Removed

...

Add a scan profile

Click on +Add to add a new scan profile.Image Removed

...

Scan settings

Under Scan Settings lets you , choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, SSN, and Street.Image Removed

...

Select Default Extension

Select the Default Extension Type Select All option. Users can select optional extension types html, json, yaml, yml, tex, xml, ts, sh, wpd, php, go, cpp, c, js, xlsm.Image Removed

...

Select the appropriate Source Type and an Agent to use for PII Scan.

Select the Default Source Type as Files to be used for this scan.

Select Source Type as Files and provide information for Path Settings such as Included Location(s). Exclude the Location for the system to be scanned.

Once all required fields are selected, please click on Save to successfully save this the PII Profile with a message as Saved Successfully.

Initiate PII Scan

Locate and select the profile for which you want to initiate the PII scan.

...

Once the scan is complete, review the results to identify any flagged Personally Identifiable Information. This may include names, addresses, social security numbers, or other sensitive data.Image Removed

...

Based on the scan results, take appropriate actions. This could involve redacting or encrypting sensitive information, notifying relevant parties, or implementing additional security measures.Image Removed

...

Clicking on the highlighted PII data will redirect you to the detailed view of the chosen PII data.

...