...
The overview company dashboard provides a comprehensive view of data for a single company, multiple or all of them simultaneously. We provide over 20 pre-built dashboards that display your most important data. You can personalize the dashboard(s) using our filtering and editing features to suit your needs.
...
Company Dashboard - Table of Contents
Table of Contents | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
Company Dashboard - Overview
The default dashboard will be ‘Overview,’ which can be changed using the drop-down to select a different option.
...
Set your desired filtering options, then tap APPLY FILTERS to view it in the dashboard.
...
Company Dashboard - Details
The following dashboard views are available:
Category | Dashboard Name |
---|---|
Active Directory | AD Computers |
Active Directory | AD GPOs |
Active Directory | AD Groups |
Active Directory | AD OUs |
Active Directory | AD Users |
Overview | Agent Details |
Assets | Application Vulnerability |
Assets | Asset Details |
Active Directory | Azure AD Computers |
Active Directory | Azure AD Groups |
Active Directory | Azure AD Logs |
Active Directory | Azure AD Microsoft Secure Score |
Active Directory | Azure AD Roles |
Active Directory | Azure AD Users |
Vulnerability | CISA Vulnerabilities |
Compliance | Compliance Standard PCI DSS |
Compliance | Compliance Standard CIS |
Compliance | Compliance Standard Cyber Essentials |
Compliance | Compliance Standard Essential Eight |
Compliance | Compliance Standard GDPR |
Compliance | Compliance Standard GPG 13 |
Compliance | Compliance Standard HIPAA |
Compliance | Compliance Standard ISO 27002 |
Compliance | Compliance Standard NIST 800 171 |
Compliance | Compliance Standard NIST 800 53 |
Compliance | Compliance Standard NIST CSF |
Vulnerability | Critical Vulnerabilities |
Assets | External Scan |
Overview | Job Details |
Assets | Network Vulnerabilities |
Overview | Overview (default) |
Assets | Port Details |
Assets | Remediation Plan |
Vulnerability | Suppreessecd Vulnerabilities |
Vulnerability | Vulnerability Summary |
...
Company Dashboard - Side Navigation Toolbar Overview
The side navigation toolbar provides a set of actions to change the Company settings. This toolbar should be docked on the right and always visible. It includes system-built-in actions.
...
Tag Rules - tap here to Add, Edit, or Delete company-level Tag Rules (auto tags).
Company Settings - tap here to set Company level settings for Ports Policy, Deprecation Days, EDR Application, Backup Software, Compliance Scan, and Remote Agent Install options.
Update Company Details - tap here to edit Company-level details that include Company Name, Description, City, State, Country, and Zip Code.
Application Baseline - tap here to Add, Edit, or Delete company-level application baseline rules; see Global Application Baseline Resultsfor the results.
Alerts - tap here to see the timeline style System Events.
...
Company Dashboard - Side Navigation Toolbar Actions
Tag Rules
Info |
---|
best pratice |
This is where you manage your Auto Tags that apply at the company level. Any existing Tag Rules will display in the window and allow you to ‘Edit’ or ‘Delete’ them from Tag Rules enable the user to input search criteria, which scan all assets and apply tags based on the criteria.
Example!
Edit or Delete Tag Rules
You will see any of the existing tag rules in the table view, where you can use the three-dot action menu to Edit or Delete.
...
Click on the ‘Add’ button to build a new Tag Rule.
...
...
Add New Tag Rule
Tap the Add button to create a new tag rule.
...
Complete all the required fields and tap the Save button; otherwise, click Cancel to back out.
...
, which include Name, Risk Score, Collection, Description, and the Name/Value for the actual tag. You will also need to specify the Rules section which includes a boolean for AND/OR with different field selections.
...
Field | Description |
---|---|
Name | Give the tag rule a name of your choice |
Risk Score | Enter a risk score if you want to modify the risk score of any asset where this rule matches. If you do not want to change the risk score, enter zero (0). |
Collection | Select the Collection which organizes the tags by Assets, Ports, and Problems |
Description | Give the tag rule a description of your choice |
Rules | Used to build a search query with specific search criteria; the rule will check all assets for a match and apply the specified tag(s) |
Tags: Name | Give the tag a name of your choice |
Tags: Value | Give the tag a value of your choice (string or integer) |
...
Auto Tags will be displayed on the individual asset details and can be viewed from the Assets table view.
...
Company Settings
Company Ports Policy
Specify Insecure, Denied, Excluded, and/or Allowed Ports
...
Company Deprecation Days
Set asset and/or Agent deprecation days and your Suppress Vulnerabilities days.
...
Company EDR Application
The Global EDR applications contain the list of antivirus applications shown in the security report card for the respective assets. Any application not listed as antivirus under Global EDR applications can be added here. Please run a scan after adding it to reflect the application name in the security report card of the respective asset. To Exclude any application from the Global EDR applications list, please click on the 'X' for the selected application.
...
Company Backup Software
Any Backup Software not already listed under Backup Software can be added here. Please run a scan after adding it here to reflect the software name in the security report card for the respective asset.
To Exclude any of the Backup Software from the Global Backup Software list, please click on the 'X' for the selected software.
...
Company Compliance Scan
Set the Compliance types to be scanned here. Only the selected options will be activated when running compliance scans. This will reduce the time it takes to complete and the load on the scan agents.
...
Company Remote Agent Install
By Enabling Remote Agent Install, you can install Lightweight Agents on the Probe Discovered Assets.
...
Update Company Details
Update any Company details, including the Company Name, Description, and Address information.
...
Application Baseline
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
What is the Application Baseline? We use the ConnectSecure Vulnerability Scan Agent to scan for any installed Application or Service on assets. Once identified, we classify them as either Denied or Mandatory based on the rules you configure. The results will then be published to the Application Baseline Results screens for either the Global or Company level views; links to detailed pages below. |
...
Tap the ADD button to start a new rule; complete all required fields and tap Save.
...
Alerts
Tap to view the timeline style, System Events.
...
Need Support?
Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.
...