Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents


Getting Started

Email

ConnectSecure has already signed you up for the new instance.

...

To log into the portal please click on the portal link as shown in the picture above. Activate the user by following the instructions on the “Activate User” screen as seen below. Here is where you can set your password too.

Two-factor Authentication

Once username and password is entered, you will be redirected to set up authentication

...

Please get started by creating a new company.

Creating a New Company

Navigate to the "Global View" and follow these steps to create a new company

...

Save Changes: After filling in the details, save the changes to create the new company

...

Discovery Settings and Credentials

Note:

If the scan is limited to workstations only (LIGHTWEIGHT), please skip the "Discovery Settings and Credentials" section and proceed.

...

Verify Credentials: Once credentials are added, perform a verification to ensure they are valid and can be used for scanning.

Choose an OS type to add master credentials: Windows, MacOS, Linux, VMware, and Network devices.

Depending on the network setup, select either Active Directory or Asset Credential as the credential type.


...



...



...

Agent Installation

Navigate to the “Agents” section and click on "Download Agent".

...

Next, run the copied script on the Windows or Mac system with administrator permissions.

...

Map Discovery Settings and Credentials to Agent


Navigate to the "Agents" section within the application.

...

Click on the "Scan" button to initiate the scanning process for the configured agent.

Assets

Go to the 'Company View'.

Click on 'Assets' to access the assets view.

...


We can directly copy the script and run it on the machine for remediation.

...

Problems

Click on 'Assets' to access the Problems view.

...

In this section, we can suppress Problems, triggering an email to the designated user for approval. This user can be internal or external.

Remediation Plan

Click on 'Assets' to access the Remediation Plan.

...

The Remediation Plan lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.

Application Vulnerabilities

Click on 'Assets' to access the Application Vulnerabilities.

...

In this section, we can find the Application Vulnerabilities and missing OS (Operating System) security patches.

Pending OS Patches

Click on 'Assets' to access the Pending OS Patches.

...

In this section, we can review the pending OS patches across the company's view.

Ports

Click on 'Assets' to access the Ports section.


In this section, we can review the Ports details across the company's view.

Anchor
_Toc1037062264
_Toc1037062264
Anchor
_Toc361142251
_Toc361142251
Vulnerabilities

Go to the 'Company View'.

Click on “Vulnerabilities” to access the Vulnerabilities view.

...

Suppression Comments: Provide comments explaining the justification for suppressing

vulnerability.

Suppression Start Date and End Date:

Specify the start and end dates for the vulnerability suppression.

...

After completing these steps, the user will receive an email for approval. Upon approval, the request will proceed to the suppression stage.

...

Compliance

Go to the 'Company View'.

Click on “Compliance” to access the Compliance view.

...

And for Manual Compliance, we can upload evidence to mark it as compliant or not applicable.

Active Directory

Click on “Active Directory” to access the Active Directory Section.

...


Here we can find:
Problems
Identifies and lists issues or challenges.


...

AD Summary

Provides a summary of Active Directory-related information.

...

Microsoft Secure Score: Offers information and metrics related to the security score assigned by Microsoft, indicating the overall security posture.

PII Scan

Click on “PII Scan” to access the PII Scan Section.

Add a scan profile

Click on +Add to add a new scan profile.

Scan settings

Scan Settings lets you choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, SSN, and Street.

Select Default Extension

Select the Default Extension Type Select All option. Users can select optional extension types html, json, yaml, yml, tex, xml, ts, sh, wpd, php, go, cpp, c, js, xlsm.

...

Clicking on the highlighted PII data will redirect you to the detailed view of the chosen PII data.

Dashboard

On the right Pane, click on the Dashboard icon to be redirected to the Dashboard section. This area provides an overview of relevant information and data. Once in the Dashboard section, you can proceed to the next step.

...