Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

...

Purpose

Brief

Introduction

...

Agent Configuration

Company

Assets

Vulnerability

Compliance

Software Repository

Software Inventory

Settings

Dashboards

Introduction

Netalytics User Manual describes the easy installation and access of the application which includes Agent configuration, discovery, managing assets, patch management, and other significant aspects and user guidelines.

Agent Configuration:

1. Installation Procedure

Company System Registration

Go to <URL>. Go to <tab>

Click on the ‘+’ button in the Company dashboard. Enter the Company Name, Agent Name, and the Company Description (optional).

Image Added

You have successfully created the company.

Agent Installation

Download and Install the NetalyticsAgent.exe file.

Image Added

Enter Server and Site ID for a successful installation

Image Added

Note: Click on Continue without Agent installation button, If not willing to wait for registration

2. Scan all agent subnets

Will have an option to scan all agent subnets without providing subnet details in portal prior to agent installation, 

  1. You will receive an mail on a successful installation.

  2. Have an option to download Server and Secret code for hassle-free entry

3.Agent Installation

Download and Install

Click on “Settings”-> “Downloads”

Image Added

Download Agent and run the exe. Agent will get installed.

Image Added

Windows Protect your PC

Open the installed agent and select More info in Windows Protect your PC page. Select Run anyway to install the agent

Image Added

License Agreement

You will find a popup screen asking permission to install Netalytics Agent. Click on YES and Select the radio button To  accept the agreement option in the License Agreement popup and Click next for the further steps

Image Added

Provide the destination location in which you would prefer to save the agent in Select destination popup screen. Once the path is defined, click on Next for the Agent configuration.

Note: By default, the system suggests “C:\Program Files (x86)\NetalyticsAgent “ this path to save the agent.

Image Added

Key-in the Server and Secret code details optioned from Configuration information during Agent installation.

Image Added

Finish the Installation by agreeing the terms and conditions

4.Asset Configuration

Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets. 

  1. If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.

  2. On providing Static IP, the system scans the Vulnerabilities in that specific system.

  3. If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company  

To initiate the configuration

Step. 1: Select the CIDR | IP Range | Static IP

Image Added
Image Added
Image Added

Save the IP address

Step 2: Save the IP Address

Step 3: Add Master Credentials

At this stage, you can specify the master credentials or just skip and finish the installation.

Note: Credentials can be added before you initiate the Vulnerability scan.

 

Image Added

5.Summary

Image Added

Once the configuration is successfully completed, the System generates an overall summary report on overall system specification

Image Added

Click on the finish button and now the system is ready to scan Vulnerabilities

Image Added

 

Company

Once Agent is installed successfully, click on the Company Icon on the Global tab and select the created company for further process.

Image Added

Click on the Company Name, The page will get redirected to the company Dashboard. Once entered the page, will be able to view Company Dashdashboard, Assets, Vulnerabilities, Compliance, Audit Log and Report Tables

Image Added

In the settings tab: Select Jobs to view the number of devices discovered in the specified range during Agent Installation, any failed jobs, and the status of Agent Configuration.

Image AddedImage Added

Select Discovery Tab: Have 4 credential options

1.SNMP Credentials: If SNMP credentials specified and saved during agent installation, The agent will automatically scan the network devices, as specified below.

Image Added

2. IP Ranges: We have 3 types of IP ranges, CIDR, IP Range, and Static IP. Click on IP Range Type and select CIDR in the drop-down to specify start IP and IP range type and save to view

IP Ranges: CIDR

Step 1:

Image Added

Click on + button to select the type of CIDR in the drop-down

Step 2:

Image Added

Enter the IP range for which intended to discover and save

Step 3:

Image Added

Select the IP ranges and Click on Start scan to discover the select IP ranges.

IP Ranges: IP Range

Step 1:

Image Added

Click on + button to select the type of IP range in the drop-down

Step 2:

Image Added

Select the type of IP range and enter the IP range for which intended to discover.

Step3:

Image Added

Select the single or multiple IP ranges and click on Start Scan to discover the IP range.

IP Ranges: Static IP

Step 1:

Image Added

Click on the + button, and select Static IP to Scan Single device.

Step 2:

Image Added

Enter static IP and save

Step 3:

Image Added

Select the static IP and click on Start Scan to discover the static IP.

Active Directory Credentials:

Step 1:

Image Added

Click on + button to enter the AD credentials

Step 2:

Image Added

Fill in the required details and click on Save Credentials to save.

Step 3:

Image Added

The screen will reflect the AD credentials ready to scan.

Note: If AD credentials specified during network discovery, System will verify and Scan the AD devices automatically.

Master Credentials:

Step 1:

Image Added

Click on + button to start entering the Master Credentials

Step 2:

Image Added

Fill In the required fields and enter save

Step 3:

Image Added

Master credentials successfully added.

Note: If Master credentials available during network discovery, System will verify and Scan the AD devices automatically.

Assets: Will be able to view details pertaining to the devices discovered during agent installation,

Image Added

Will be able to perform many other actions when clicked on the action drop-down.

Image Added
  • Edit:

    • When selected, We will be able to change the OS Type and Host IP and will be able to specify the criticality of the device scan.

    • Can enter the Tag Name as per the specifications described in the Popup. this is can be considered during the Patch update.

    • We can add the credentials of the device details such as User Name, Password, Domain name, and Port details of the device.

      Image Added

  • Details: Can view 3 categories of details such as Device Details, Vulnerabilities, and CIS Compliance

    • Device Details: will be able to view complete device details such as

Device Details

  • Device Info

  • Vulnerabilities Score

  • Vulnerabilities

  • Severity to CVSS score

  • Ports open

  • External Vulnerabilities

  • Compliance

  • SNMP

  • UPNP

  • SMB Shares

  • Zero Config

  • HTTP Data

  • Available patches

  • Installed software

Image AddedImage Added

  • Vulnerabilities: Under Vulnerabilities, we can view Authenticated and Unauthenticated Vulnerabilities.

    • Authenticated Vulnerabilities: This will be reflected once the specified device completes the Vulnerability scan.

    • Unauthenticated Vulnerabilities: This will be refected once the device discovery is completed.

Image Added

  • CIS Compliance: This will be reflected once the specified device completes the compliance scan.

Image Added

  • Vulnerability Report: Will be able to view the report pertaining to the complete Vulnerabilities of the device.

Image Added
  • Compliance Matrix:

<<Need clarification >>

  • Compliance Report: Will be able to view the report pertaining to the complete Compliance of the device.

  • Image Added
  • Delete: Will be able to delete single or multiple assets at one go.

Global Actions

Under Assets, select a specific device and click on global action to get a drop-down with actions such as Assets scan, Add Tag, Vulnerability Scan, Windows Packages Scan, Compliance Scan and Delete.

Image Added
  • Assets Scan: Discovery of the selected devices will be initiated for device discovery.

Step 1:

Image Added

Click on Company → click on company hyperlink

Step 2:

Image Added

Select single or multiple IP addresses → Click Global actions → Assets Scan

Step 3:

Image Added

Will get a popup on the successful discovery

Note: Visit job section for further process

  • Add Tag:

Step 1:

Image Added

Select Add tag

Step 2:

Image Added

Enter the required details

Note: Tag Name entered is considered during the Patch update. (Name mentioned is for reference only)

Step 3:

Image Added

After a successful update, will get a confirmation pop-up

  • Vulnerability Scan

Step 1:

Image Added

Select the device → click on Global action → select Vulnerability scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Step 3:

Image Added

Once the system verifies credential and other required details in the backend will receive a status popup.

  • Windows Packages Scan

Step 1:

Image Added

Select the device → click on Global action → select Windows Packages scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Note: Can check the data related to Windows Packages Scan in Reports.

Compliance Scan

Step 2:

Image Added

Select the device → click on Global action → select Compliance scan option to initiate the scan

Step 2:

Image Added

Will receive a popup message on scan initiation

Step 3:

Image Added

Once the system verifies credential and other required details in the backend will receive a status popup.

Note: Can check the data related to Windows Packages Scan in Jobs

  • Delete

Company Vulnerabilities

In this category will be able to view the Active and Suppressed Vulnerabilities data with reports related to each specific.

Image Added
  • Active Vulnerabilities

The system scan analyzes and displays OS wise asset vulnerabilities related to the selected company. The system further segregates the Vulnerabilities into Critical, High, Medium and low priorities. list of the Vilnerabilites can be viewed by clicking on the linked numbers under each category.

Critical

Image Added

High

Image Added

Medium

Image Added

Low

Image Added

  • Suppressed Vulnerabilities

Admin has the right to suppress the active Vulnerabilities based on the business rules of the company. The Suppressed Vulnerabilities can be viewed under this category.

Image Added

Assets Compliance

This category will be able to view the Active compliance rules which include compliant and non-compliant rules.

Image Added

Operating System wise Compliant

Image Added

Non Compliance:

Image Added

Audit Log

Both Login Audit and System login details can be viewed under this Tab.

Image Added

Login Audit: In this details pertaining to users, browsers, devices, mail ID, OS… through which the system was accessed.

Image Added

System Audit: System Operations related data that includes, Company creation, deletion, Agent Creation, Agent deletion, Discovery setting creation, Discovery setting deletion,… log details can be viewed in this section.

Image Added

Settings

In this category, Will be able to customize creating Users, Roles, Download agent, Scheduler, Integration, Custom Compliance, web scanning, Software Repository.

Image Added

Users

Step 1:

Image Added

Click + button → Enter the required credentials→ click on Add ACL button → Select Companies → Specify the Role → Save

Step 2: Add ACL

Image Added

The above table is popped up when clicked on Add ACL → Search or scroll to select single/Multiple Company Name → press '<' button.

Step 3:

Image AddedImage Added

Find the popup with a successful update and can view the User created.

Roles

In this category, Roles can be defined with task rights.

Step 1:

Image Added

Click + button → Enter the required credentials→ click on save→ Select Companies → Specify the Role → Save

Step 2:

Image AddedImage Added

Find the popup with a successful role creation and can view the Role created.

Schedulers

In this section, the Admin/ Authorised person can schedule (hourly, weekly, Monthly ) Scan such as Vulnerability Scan, Compliance, Asset discovery

Step 1:

Image Added

Click + button → Select Company→ → Select Scan → Specify the Role → Save

Step 2:

Image AddedImage Added

Can specify, time and date and click ok

Step 3:

Image Added

Click on the Active button to set the Scheduler. Once the scheduler is set the scan happens automatically as per schedule.

Integration

By following these simple steps, Will be able to integrate Netalytics application with the Customer ticketing System. Tickets are automatically generated and tracked with this.

Step 1:

Image Added

Click settings → Integrations

Step 2:

Image Added

Click on the Ticket Mapping → Enter all required credentials → Save

Step 3:

Image Added

Can view, edit, and delete Credentials when clicked on Integration Mapping.

Image Added

Click on the action button to edit or delete the mapping credentials.

Software Repository

In this segment, Will have silent up-gradation of the selected dependency software. Once published it will move into software inventory for further patch installation.

Step 1: Software Information

Image Added

Click + button → Add adequate software Information → Next

Step 2: Registry Details

Image Added

Click on Add button to add more Key Fields

Image Added

Step 3: Dependency Info

Select the dependency details for the dropdown and click save.

Image Added

Will get a popup on successful patch repository creation

Image Added

Software Inventory

This segment will be able to apply the patches that were installed in the Software repository. Once the patched are successfully applied will observe fall in Vulnerabilities count.

Dashboard: In Dashboard, we will be able to see the stats of the Company/Range that was specified during Agent Installation.

Image Added

Image Added

Image Added