...
The overview company dashboard provides a comprehensive view of data for a single company, multiple or all of them simultaneously. We provide over 45 pre-built dashboards that display your most important data. You can personalize the dashboard(s) using our filtering and editing features to suit your needs.
...
Company Dashboard - Table of Contents
Table of Contents | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
Company Dashboard - Overview
The default dashboard will be ‘Overview,’ which can be changed using the drop-down to select a different option.
...
Set your desired filtering options, then tap APPLY FILTERS to view it in the dashboard.
...
Company Dashboard - Details
The following dashboard views are available, organized by category with multiple dashboards under each.
Category | Dashboard Name | Pages | ||
---|---|---|---|---|
Active Directory | AD Audit | AD Audit, AD User Audit, AD Computer Audit, AD OU Audit, AD Group Audit | ||
Active Directory | AD Computers | AD Computers Summary, AD Computer Details | ||
Active Directory | AD GPOs | GPO Summary, GPO Detailed Table | ||
Active Directory | AD Groups | AD Groups Summary, AD Group Details | ||
Active Directory | AD OUs | AD OU’s Summary, AD OU’s Details | ||
Active Directory | AD Password Policy | Password Policy | ||
Active Directory | AD Users | AD User Summary, AD Users Detailed Table | ||
Active Directory | Microsoft Entra ID AD Computers | Microsoft Entra ID Computers Summary, Microsoft Entra ID Computer Details | ||
Active Directory | Microsoft Entra ID Groups | Microsoft Entra ID Groups Summary, Microsoft Entra ID AD Groups Details | ||
Active Directory | Microsoft Entra ID AD LicenseLicense | Microsoft Entra ID License Summary, Microsoft Entra ID License Details | ||
Active Directory | Microsoft Entra ID AD LogsLogs | Microsoft Entra ID Logs Summary, Microsoft Entra ID Logs Details | ||
Active Directory | Microsoft Entra ID AD Microsoft Secure Score | Microsoft Entra ID Microsoft Secure Score | ||
Active Directory | Microsoft Entra ID Roles | Microsoft Entra ID Roles Status, Microsoft Entra ID AD Roles Details | ||
Active Directory | Microsoft Entra ID Users | Microsoft Entra ID AD UsersUsers Status, Microsoft Entra ID Users Details | ||
Assets | Application Vulnerability | Assets | Asset DetailsAsset Details | Assets Summary, Assets Details, Assets Details Breakdown |
Assets | External Scan | External Scan Summary, External Scan Details | ||
Assets | OS by Assets | Network VulnerabilitiesOS by Assets | ||
Assets | Port Details | AssetsPorts Summary | ||
Remediation PlanCompliance | Compliance Standard CISCompliance Standard CIS | CIS Compliance Status, CIS Compliance by Section, CIS Asset Compliance Status | ||
Compliance | Compliance Standard Cyber Essentials | Cyber Essentials Compliance Status, Cyber Essentials Compliance by Section, Cyber Essentials Compliance Details | ||
Compliance | Compliance Standard Essential Eight | Essential Eight Compliance Checks Summary, Mitigation Strategy Details, Essential Eight Details | ||
Compliance | Compliance Standard GDPR | GDPR Compliance Status, GDPR Compliance by Section, GDPR Compliance by Asset Wise Status Details | ||
Compliance | Compliance Standard GPG 13 | GPG 13 Compliance Status, GPG 13 Compliance Status by Section, GPG 13 ComplianceDetails | ||
Compliance | Compliance Standard HIPAA | HIPAA Compliance Status, HIPAA Compliance Status by Section, HIPAA Compliance Details | ||
Compliance | Compliance Standard ISO 27002 | ISO 27002 Compliance Status, ISO 27002 Compliance Status by Section, ISO 27002 Compliance Details | ||
Compliance | Compliance Standard NIST 800 53 | NIST 800 53 Compliance Status, NIST 800 53 Compliance Status by Section, NIST 800 53 Compliance Details | ||
Compliance | Compliance Standard NIST 800 171 | NIST 800 171 Compliance Status, NIST 800 171 Compliance Status by Section, NIST 800 171 Compliance Details | ||
Compliance | Compliance Standard NIST CSF 2.0 | NIST CSF Compliance Status, NIST CSF Compliance Status by Section, NIST CSF Compliance Details | ||
Compliance | Compliance Standard PCI DSS | PCI DSS Compliance Status, PCI DSS Compliance by Section, PCI DSS Compliance Details | ||
Overview | Agent Details | Agent Summary, Agent Details | ||
Overview | Company Snapshot View | Summary | ||
Overview | Consolidated Report | Summary | ||
Overview | Executive Summary | Executive Summary | ||
Overview | Insecure Listening Ports | Insecure Listening Ports | ||
Overview | Installed Software | Installed Software | ||
Overview | Job Details | Job Summary, Job Details, Report Jobs, Attack Surface Mapper Jobs, PII Scan Jobs, External Scan Jobs, Firewall Scan Jobs | ||
Overview | Overview (default) | Summary, Vulnerability Details, Vulnerability Trending | ||
Vulnerability | Application Vulnerabiliites | Application Vulnerability Summary, Application Vulnerability Details | ||
Vulnerability | CISA Vulnerabilities | CISA Vulnerability Summary, CISA Vulnerability Details | ||
Vulnerability | ConnectWise ScreenConnect Vulnerabilities | Screenconnect Vulnerabilities Summary, Screenconnect Vulnerabilities Details | ||
Vulnerability | Critical Vulnerabilities | Problem Summary, Problem Details | ||
Vulnerability | Microsoft Support Diagnostic Tool | MSDT Vulnerability Summary, MSDT Vulnerability Details | ||
Vulnerability | Network Vulnerabilites | Network Vulnerabilities Summary, Network Scan Findings, Network Vulnerabilities Details | ||
Vulnerability | Patch Management | Patch Details, Application Patching, OS Patching, Automatic Patching, Manual Patching, Patch Status | ||
Vulnerability | Pending OS Patches | Pending OS Patches Summary, Pending OS Patches Details | ||
Vulnerability | PII Scan | PII Scan Results, PII Phone, PII Email, PII Credit Card, PII SSN, PII MAC Address, PII Driving License, PII IP Address, PII Bank Account, PII DOB, PII Auth Token | ||
Vulnerability | Remediation Summary by EPSS ScorePlan | Remediation Summary, Remediation Details, Software Remediations, OS Remediations | ||
Vulnerability | Risk Score Card | Risk Score Summary, Risk Score Details, Historic Trend of Risk Score | ||
Vulnerability | Secure Boot PKfail Vulnerabilites Summary | Secure Boot PKfail Vulnerabilities Summary | ||
Vulnerability | Security Report Card | Security Report Card, Compliance Report Card | ||
Vulnerability | Suppressed Vulnerabilities | Suppressed Records, Suppressed Vulnerabilities | ||
Vulnerability | Vulnerability Summary | Vulnerability Summary, Vulnerability Details, Application Vulnerability Details, Network Vulnerability Details, Suppressed Vulnerability Details, Vulnerability by OS Summary |
...
Company Dashboard - Action Toolbar Overview
Dashboard Full Screen
Access the full-screen mode by tapping the toggle button:
...
Action | Description |
---|---|
Update Company | Tap to update the company details that include the Name, Description, City, State, Zip, Country, and Zip Code information |
Search | Search the CVE database for the selected company; any data found will be displayed with asset link information |
Alerts | Timeline-style system events for the selected company |
Info | Displays the Getting Started menu |
Help Link | Hyperlink to the corresponding documentation page; tap to see the relevant documentation page(s). |
...
Company Dashboard - Action Toolbar Details
Update Company
Tap here to update the selected company’s details, such as Name, Description, City, State, Country, and Zip Code.
...
Search
Use the company-level CVE database search. Requires the Year and Article Number (YEAR-NNNNNN) format.
CVE data and any affected assets will be displayed in your portal.
...
Alerts
View the timeline-style system events for the selected company.
...
Getting Started
Tap to view the Getting Started wizard; see the link below for additional information.
V4 Getting Started In App Info
...
Need Support?
Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.
...