Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents
minLevel1
maxLevel6
outlinefalse
typelist
printablefalse


Getting Started

Email

ConnectSecure has already signed you up for the new instance.

...

Navigate to the “Agents” section and click on "Download Agent".

...


...

Image RemovedImage Added


Copy the script by selecting the "Copy to Clipboard" option.

...

Locate and click on the "Action Button" (often represented by three dots or a gear icon) associated with the specific agent thathat needs to be configured.

...


...



From the menu that appears, select "Map Discovery & Credentials"

...

In the "Map Discovery & Credentials" section, you will find options locate the options to associate Discovery Settings and Credentials with the selected agent.

...

Similarly, map the necessary Credentials credentials to the agent by choosing the relevant credentials from the list.Image Removed

...


Once you have mapped the Discovery Settings and Credentials are mapped, click the "Save" button to apply the changes.

...

After successfully mapping the Discovery Settings and Credentials, return to the "Agents" section.

Locate the agent for which you configured the settings and credentials.that has been configured the under the Discovery Settings and Credentials. 

Click on the "Scan" button to initiate the scanning process for the configured agent.

...

Go to the 'Company View'.
Click on 'Assets' to access the assets view.

...

In this section, you will find a comprehensive is a comprehensive list of scanned assets. 
The list includes assets along with their associated risk scores and vulnerability counts.

...

Clicking on the IP Address will redirect you , to the detailed view of the chosen asset.

...

In this section, you can find the following information about the assetassets are available:

  • System information

  • Storage

  • Network information

  • BIOS Information

  • Firewall Policy

  • Problems

  • Solutions

  • Firewall Rules

  • Internal Ports

  • External Ports

  • Software

  • Asset Patches

  • Extension Programs

  • Services

  • User Shares

...

For network vulnerabilities, we can please find the scripts to remediate them.Image Removed

...

We can
Please directly copy the script and run it on the machine for remediation.

...

Problems

Click on 'Assets' to access the Problems view.

...

In this section, we can identify all the problems related to assets at the company level can be identified.Image Removed

...

In this section, we one can choose to suppress Problems, by triggering an email to the designated user for approval. This user can be internal or external.

...

Click on 'Assets' to access the Remediation Plan.Image Removed

...

The Remediation Plan lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.

Image RemovedImage Added

Application Vulnerabilities

Click on 'Assets' to access the Application Vulnerabilities.Image Removed

...

In this section, we can find the Application Vulnerabilities and missing OS (Operating System) security patches are listed.Image Removed

...

Pending OS Patches

Click on 'Assets' to access the Pending OS Patches.

...