...
Once the authentication is set, you will be redirected to the portal.
Please get started by following a pre requisites and creating a new company.
Pre requisites
Please open port 4222 from agent machine to below IP addresses of respective regions (where ConnectSecure instance is hosted) for successful communication.
Please whitelist outbound communication from agent machine to *.myconnectsecure.com.
Region | POD number | IP’s | Load Balancer IP’s |
---|---|---|---|
US | POD101 | 155.138.163.9 | 144.202.23.74 |
US | POD102 | 149.28.93.167 | 45.77.87.242 |
US | POD103 | 45.77.164.106 | 104.207.144.192 |
US | POD104 | 149.248.11.111 | 144.202.125.97 |
US | POD105 | 155.138.201.146 | 66.42.92.100 |
CA | POD200 | 216.128.178.144 | 155.138.140.251 |
UK LONDON | POD300 | 95.179.196.101 | 209.250.225.16 |
EU POLAND | POD400 | 70.34.254.208 | 64.176.69.126 |
EU MADRID | POD401 | 65.20.105.37 | 65.20.103.34 |
AU SYDNEY | POD500 | 45.32.245.127 | 139.180.161.236 |
AF | POD600 | 139.84.226.34 | 139.84.229.231 |
Creating a New Company
Navigate to the "Global View" and follow these steps to create a new company
...
Verify Credentials: Once credentials are added, perform a verification to ensure they are valid and can be used for scanning.
Choose an OS type to add master credentials: Windows, MacOS, Linux, VMware, and Network devices.
Depending on the network setup, select either Active Directory or Asset Credential as the credential type.
...
...
...
Agent Installation
Info |
---|
|
...
Copy the script by selecting the "Copy to Clipboard" option.
...
Assets
Go to the 'Company View'.
Click on 'Assets' to access the assets view.
...
In this section, you will find a comprehensive list of scanned assets.
The list includes assets along with their associated risk scores and vulnerability counts.
...
In this section, you can find the following information about the asset:
System information
Storage
Network information
BIOS Information
Firewall Policy
Problems
Solutions
Firewall Rules
Internal Ports
External Ports
Software
Asset Patches
Extension Programs
Services
User Shares
...
We can directly copy the script and run it on the machine for remediation.
...
Problems
Click on 'Assets' to access the Problems view.
...
In this section, we can suppress Problems, triggering an email to the designated user for approval. This user can be internal or external.
...
Solutions
Click on 'Assets' to access the Remediation PlanSolutions.
...
The Remediation Plan Solutions lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.
...
Application Vulnerabilities
...
Scan Settings lets you choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, and SSN, and Street.
Select Default Extension
...
Once all required fields are selected, please click on Save to successfully save this PII Profile with a message as Saved Successfully.
Initiate PII Scan
Locate and select the profile for which you want to initiate the PII scan.
...