Panel | ||||||||
---|---|---|---|---|---|---|---|---|
panelIconId | 1f914 | |||||||
panelIcon | :thinking: | |||||||
Panel | ||||||||
| ||||||||
What is Company Dashboard? Consider this your company-level homepage, where you will find the company-built dashboards and additional company level settings that include Tag Rules, Company Settings, Company Details Update, Application Baseline, Integrations, CVE Search, and Alerts at the company level, which override Global Settings. |
...
The overview company dashboard provides a comprehensive view of data for a single company, multiple or all of them simultaneously. We provide over 20 pre-built dashboards that display your most important data. You can personalize the dashboard(s) using our filtering and editing features to suit your needs.
...
Company Dashboard - Table of Contents
Table of Contents | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
Company Dashboard - Overview
The default dashboard will be ‘Overview,’ which can be changed using the drop-down to select a different option.
...
Set your desired filtering options, then tap APPLY FILTERS to view it in the dashboard.
...
Company Dashboard - Details
The following dashboard views are available:
Category | Dashboard Name |
---|---|
Active Directory | AD Computers |
Active Directory | AD GPOs |
Active Directory | AD Groups |
Active Directory | AD OUs |
Active Directory | AD Users |
Overview | Agent Details |
Assets | Application Vulnerability |
Assets | Asset Details |
Active Directory | Azure AD Computers |
Active Directory | Azure AD Groups |
Active Directory | Azure AD Logs |
Active Directory | Azure AD Microsoft Secure Score |
Active Directory | Azure AD Roles |
Active Directory | Azure AD Users |
Vulnerability | CISA Vulnerabilities |
Compliance | Compliance Standard PCI DSS |
Compliance | Compliance Standard CIS |
Compliance | Compliance Standard Cyber Essentials |
Compliance | Compliance Standard Essential Eight |
Compliance | Compliance Standard GDPR |
Compliance | Compliance Standard GPG 13 |
Compliance | Compliance Standard HIPAA |
Compliance | Compliance Standard ISO 27002 |
Compliance | Compliance Standard NIST 800 171 |
Compliance | Compliance Standard NIST 800 53 |
Compliance | Compliance Standard NIST CSF |
Vulnerability | Critical Vulnerabilities |
Assets | External Scan |
Overview | Job Details |
Assets | Network Vulnerabilities |
Overview | Overview (default) |
Assets | Port Details |
Assets | Remediation Plan |
Vulnerability | Suppressed Vulnerabilities |
Vulnerability | Vulnerability Summary |
...
Company Dashboard - Action Toolbar Overview
The action toolbar provides a set of actions to change the Company-level settings.
...
Action | Description |
---|---|
Tag Rules | Add, Edit, or Delete existing tag rules for the selected company |
Settings | Company level settings; override the Global level settings see Details section below for additional information |
Update Company Details | Tap to update the company details that include the Name, Description, City, State, Zip, Country, and Zip Code information |
Integrations | Displays the Integrations list for the selected company See V4 Integration Setup Guidesfor more information |
CVE Search | Search the CVE database for the selected company; any data found will be displayed with asset link information |
Alerts | Timeline style system events for the selected company |
Getting Started | Displays the Getting Started menu |
...
Company Dashboard - Action Toolbar Details
Tag Rules
Tag Rules enable you to specify search criteria (rules), which are used during the scan of all assets. If the search criteria is true, the system will apply the tag to the asset(s).
Edit or Delete Tag Rules
You will see any of the existing tag rules in the table view, where you can use the three-dot action menu to Edit or Delete.
...
Add New Tag Rule
Tap the Add button to create a new tag rule.
...
Auto Tags will be displayed on the individual asset details and can be viewed from the Assets table view.
...
Company Settings
...
Ports Policy
Specify Insecure, Denied, Excluded, and/or Allowed Ports
Info |
---|
Allowed ports, denied ports, and insecure ports are used for flagging the information on the asset Report Card. When you add the port number this will still scan the ports for vulnerabilities. You can use the exclude port option to exclude the ports from scanning. |
...
...
Deprecation Days
Set asset and/or Agent deprecation days and your Suppress Vulnerabilities days.
Deprecation is basically your inactive state. This keeps data in the portal without ‘deleting’ the asset/data.
...
...
EDR Application
The Global EDR applications contain the list of antivirus applications shown in the security report card for the respective assets. Any application not listed as antivirus under Global EDR applications can be added here. Please run a scan after adding it to reflect the application name in the security report card of the respective asset. To Exclude any application from the Global EDR applications list, please click on the 'X' for the selected application.
...
...
Backup Software
Any Backup Software not already listed under Backup Software can be added here. Please run a scan after adding it here to reflect the software name in the security report card for the respective asset.
To Exclude any of the Backup Software from the Global Backup Software list, please click on the 'X' for the selected software.
...
...
Compliance Scan
Set the Compliance types to be scanned here. Only the selected options will be activated when running compliance scans. This will reduce the time it takes to complete and the load on the scan agents.
...
LW Agent Scan Interval
Set your default scan interval for any installed Lightweight Agents for the selected company.
Info |
---|
By default, the LWA will scan every 15 minutes if not changed. |
...
...
Remote Agent Install
By Enabling Remote Agent Install, you can install Lightweight Agents on the Probe Discovered Assets.
Info |
---|
|
...
Patching Status
Enable the ConnectSecure patching engine from the probe and lightweight agent type(s).
Note |
---|
This feature requires additional setup under the Patch Scheduler and will not automatically start patching assets. Manual patching can be found under the company-level Patch Management module. |
...
...
Domain Scan
Enter a domain name to do a domain information lookup on SPF or MX records.
Info |
---|
You can use the Attack Surface Mapper to view this information and provide reporting. |
...
...
Anti Ransomware
The Global Anti-Ransomware contains the list of anti-ransomware applications shown in the security report card for the respective assets.
Any application that is not already listed as antivirus under Global Anti-Ransomware can be added here.
Run a scan after adding to reflect the application name in the security report card of the respective asset.
To Exclude any application from the Global Anti-Ransomware list, please click on the '->' for the selected application.
...
...
Brute Force Setting
Enabling the brute force setting allows the probe agent to scan for weak username/password enumeration and display the results in the Network Scan Findings section.
...
Info |
---|
SMB and MSSQL username check defaults
SNMP String Defaults
|
...
Firewall
The company Firewall contains the list of firewall applications shown in the security report card for the respective assets.
Any application that is not already listed as firewall under Global Firewall can be added here.
Run a scan after adding to reflect the application name in the security report card of the respective asset.
To Exclude any application from the Global Firewall list, please click on the '->' for the selected application.
...
...
Excluded Component(s) from Security Report Card
This is your company-level option to exclude (remove) options from the Security Report Card.
...
You will find the Security Report Card at the asset details screen shown below.
...
option to exclude (remove) options from the Security Report Card.
...
You will find the Security Report Card at the asset details screen shown below.
...
Performance Management
You can control the count of threads running for NMAP and SMB; our defaults are 4 and 40.
...
Deprecated Asset Retention Period
Set the days to retain your asset(s) data once it goes to deprecated status.
...
Info |
---|
Minimum of 3 days - Maximum of 365 days |
...
Update Company Details
Update any Company details, including the Company Name, Description, and Address information.
...
Application Baseline
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
What is the Application Baseline? We use the ConnectSecure Vulnerability Scan Agent to scan for any installed Application or Service on assets. Once identified, we classify them as either Denied or Mandatory based on the rules you configure. The results will then be published to the Application Baseline Results screens for either the Global or Company level views; links to detailed pages below. |
...
View your results under Assets > Company Application Baseline Results
...
Integrations
Tap to view or configure any of the integrations for the selected company. Thee green check mark in the corner of the tile indicates the integration is configured. The number in the tile indicates the count of credentials available for the integration.
See V4 Integration Setup Guidesfor more details on the available integrations.
...
Search CVE
Use the company-level CVE database search. Requires the Year and Article Number (YEAR-NNNNNN) format.
CVE data will be displayed and any affected assets in your portal.
...
Alerts
View the timeline style system events for the selected company.
...
Getting Started
Tap to view the Getting Started wizard; see the link below for additional information.
V4 Getting Started In App Info
...
Need Support?
Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.
...