Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

When you access your Netalytics Cyber CNS instance in your web browser for the first time, you will see the Cyber CNS -Setup Wizard. This is a series of screens which will prompt you to supply site information to install agent, and some default values to scan for your Company instance. It will also offer some more advanced options for setting up SNMP, Active Directory Credentials, IP Ranges information.

1. Prerequisite

Allow below ports access to <your_company_name>.my-netalytics.com.<<>>

  • Outbound Ports

    • TCP - 443, 4506, 4505

  • Inbound Ports

    • TCP - 443 4505, 4506

2. Agents

Adding a New Company for the first time, follow these simple steps for hurdle free installation.

Step 1: Start the process

Image Added

In Agents, click on the ‘+’ button to kick start the process.

Step 2: Company Information

Click on the New Company option, and enter the required details(Name of the Company, Site Name, Description) and save

Step 3: Agent Configuration

Image Added

To Configure the Agent - Select the required details and save.

Note: Select Use recommended settings option for optimal performance

Step 4: Asset Discovery

Image Added

Click on the highlighted hyperlink to download the agent and click on next

Step 5: Summary

<<Screenshot to be added>>

Once the configuration is successfully completed, the System generates an overall summary report on overall system specification

Step 6: Add site to existing Company

Image Added

Once Company is created successfully, Will be able to add Site in the existing company.

Click on the three-dot menu bar in the Agent → Select the existing Company option -> Add the New site details and save.

When clicked on agents, Will be able to view existing companies available in the application. Will be able to create, edit and delete the companies here.

Click on the three-dot menu bar to edit, view and add site, discovery Settings an settings many other critical elements of the application.

Will be defining all the aspects in detail,

Details:

Click on details to know the trending severity and Top 10 NoAuth Vulnerabilities of the selected company.

Edit:

Clicked on Eidt → will be able to edit the existing Company Name and Description and save the edited details.

Add Site:

Image Added

Add the Site details in the selected Company, and follow the simple process described in New Company creation

View Sites:

Image Added

Will be able to view the sites existing in the selected company and see view the status and will be able to delete as well.

Discovery Settings: Step 1

Image Removed

Click on Add site to create a new site or add a new site to the existing company.

Step 2:

Image Removed

To create a New Company: Select New Company → Fill in the required details pertaining to Name of the New company, Site Name, and Description of the Company and same

Step 3: Agent Configuration

Image Removed

To Configure the Agent - Select the required details and save.

Note: Select Use recommended settings option for optimal performance

Step 4: Asset Discovery

Image Added

In this section, Will be able to view, add, edit and delete, IP ranges, SNMP details, Master credentials and share path credentials…

Step 2: Add New SNMP Credentials

Image Added

Click on the 'SNMP details → +'to add the new credentials.

Note: click the three-dot menu to Edit and Delete the credentials

Step 3:

Image Added

Add the required details and save for successful SNMP credentials creation.

IP Ranges

Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets. 

Image Added

Create a range of the IP ranges by clicking '+' button.

Note: click the three-dot menu to Edit and Delete the credentials

Step 2:

Image Added

  1. If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.

  2. On providing Static IP, the system scans the Vulnerabilities in that specific system

Active Directory Credentials

Image Added

Similar to the other tabs, will be able to add edit and scan and delete the AD credentials

Note: If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company  

Step 2:

Image Added

Specify the required details and save credentials to create New AD Credentials for scan

Share Path Credentials:

Image Added

Will be able to set a path for the scan.

Click on the Share path details → '+' to add the new path details.

Note: click the three-dot menu to Edit and Delete the credentials

Step 2:

Image Added

Specify the required details and save credentials to create New Path for the scan.

Master Credentials:

Image Added

Click on the Master Credentials → '+' to add the new Credentials.

Note: click the three-dot menu to Edit and Delete the credentials

Step 2:

Image Added

Click on the Master credentials

Step 3:

Image Added

Select the OS type, User Name, Port details and save.

Suppressed Vulnerabilities:

Image Added

Will be able to see the count of suppressed vulnerabilities on the left top corner of the page as well as view all the identified Vulnerabilities with the specific status details.

Generate Report:

Coming Soon

Delete:

Image Added

If intended to delete the selected company → Click on yes to delete.

3. Vulnerability

Once a new Company is set and all the settings are configured, Will be able to view all the top Vulnerability in the selected company.

Image Added

4. Audit Logs

In this section will be able to view both login Audit and System Audit logs.

Login Audit

Image Added

will be able to view login related audit reports with the latest login details. This list specifies time stamp, the country from which IP was login, User-Agent, and Email ID details.

System Audit

Image Added

will be able to view the system pertaining to audit details, including timestamp, action type, action status, email…

5. Settings

In this category, Will be able to customize creating Users, Roles, Scheduler, Integrations, Report Customization, Multi-Factor Authentication, Downloads…

Image Added

Will detail in each start with Users

Users: Step 1

Image Added

Will able to view the number of users currently present in the application, as well as add, edit, update password and delete Users, actions can be performed here.

Step 2: Add User

Image Added

Click + button → Enter the required credentials→ click on Add ACL button → Select Companies → Specify the Role → Add ACL → Save

Step 3: Add ACL

Image Added

Need to add the ACL details before you create a User. Can select single or multiple companies at one go and save to add the ACL.

Roles:

Image Added

Will able to view the Roles -count currently present in the application, as well as add, edit, and delete Users, actions can be performed here.

Step 1:

Image Added

Click + button → Enter the required credentials→ click on Choose tasks → Save

Schedulers:

Image Added

In this section, will be able to set time, frequency of the Vulnerability scan.

When Clicked Will able to view the Schedulers -currently set for the scan, as well as add, edit, and delete Users, actions can be performed here.

Integration:

Coming Soon

Multi-Factor Authentication

Coming Soon

Report Customization

Image Added

Can upload Company logo in this section

Step 1:

Image Added

Customize the report output by specifying the header, footer, Company logo, and other specifications

Downloads:

Image Added

Can download the agent and follow the simple steps specified in the agent installation section for successful Agent installation.