Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

IntroductionPurpose

Agent ConfiguationConfiguration

Company

Assets

Vulnerability

Compliance

Software Repository

Software Inventory

SettingsPatch Management

Dashboards

Introduction

Purpose

Netalytics User Manual describes the easy installation and access of the application which includes Agent configuration, discovery, managing assets, patch management, and other significant aspects and user guidelines.

Agent Configuration:

1. Installation Procedure

Company System Registration

Go to <URL>. Go to <tab>

Click on the ‘+’ button in the Company dashboard. Enter the Company Name, Agent Name, and the Company Description (optional).

You have successfully created the company.

Agent Installation

Download and Install the NetalyticsAgent.exe file.

Enter Server and Site ID for a successful installation

Note: Click on Continue without Agent installation button, If not willing to wait for registration

2. Scan all agent subnets

Will have an option to scan all agent subnets without providing subnet details in portal prior to agent installation, 

  1. You will receive an mail on a successful installation.

  2. Have an option to download Server and Secret code for hassle-free entry

3.Agent

Configuration

Installation

Download and Install

Click on “Settings”-> “Downloads”

Download Agent and run the exe. Agent will get installed.

Image RemovedImage Added

Windows Protect your PC

Open the installed agent and select More info in Windows Protect your PC page. Select Run anyway to install the agent

License Agreement

You will find a popup screen asking permission to install Netalytics Agent. Click on YES and Select the radio button To  accept the agreement option in the License Agreement popup and Click next for the further steps

Provide the destination location in which you would prefer to save the agent in Select destination popup screen. Once the path is defined, click on Next for the Agent configuration.

Note: By default, the system suggests “C:\Program Files (x86)\NetalyticsAgent “ this path to save the agent.

Key-in the Server and Secret code details optioned from Configuration information during Agent installation.

Finish the Installation by agreeing the terms and conditions

4.Asset Configuration

Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets. 

  1. If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.

  2. On providing Static IP, the system scans the Vulnerabilities in that specific system.

  3. If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company  

To initiate the configuration

Step. 1: Select the CIDR | IP Range | Static IP

Save the IP address

Step 2: Save the IP Address

Step 3: Add Master Credentials

At this stage, you can specify the master credentials or just skip and finish the installation.

Note: Credentials can be added before you initiate the Vulnerability scan.

 

5.Summary

Once the configuration is successfully completed, the System generates an overall summary report on overall system specification

Click on the finish button and now the system is ready to scan Vulnerabilities

 

Company

Once Agent is installed successfully, click on the Company Icon on the Global tab and select the created company for further process.

Image RemovedImage Added

Click on the Company Name, The page will get redirected to the company Dashboard. Once entered the page, will be able to view Company Dashdashboard, Assets, Vulnerabilities, Compliance, Audit Log and Report Tables

Image RemovedImage Added

In the settings tab: Select Jobs to view the number of devices discovered in the specified range during Agent Installation, any failed jobs, and the status of Agent Configuration.

Image RemovedImage RemovedImage AddedImage Added

Select Discovery Tab: Have 4 credential options

1.SNMP Credentials: If SNMP credentials specified and saved during agent installation, The agent will automatically scan the network devices, as specified below.

Image RemovedImage Added

2. IP Ranges: We have 3 types of IP ranges, CIDR, IP Range, and Static IP. Click on IP Range Type and select CIDR in the drop-down to specify start IP and IP range type and save to view

IP Ranges: CIDR

Step 1:

Click on + button to select the type of CIDR in the drop-down

Step 2:

Enter the IP range for which intended to discover and save

Step 3:

Select the IP ranges and Click on Start scan to discover the select IP ranges.

IP Ranges: IP Range

Step 1:

Click on + button to select the type of IP range in the drop-down

Step 2:

Select the type of IP range and enter the IP range for which intended to discover.

Step3:

Select the single or multiple IP ranges and click on Start Scan to discover the IP range.

IP Ranges: Static IP

Step 1:

Click on the + button, and select Static IP to Scan Single device.

Step 2:

Enter static IP and save

Step 3:

Select the static IP and click on Start Scan to discover the static IP.

Active Directory Credentials:

Step 1:

Click on + button to enter the AD credentials

Step 2:

Fill in the required details and click on Save Credentials to save.

Step 3:

The screen will reflect the AD credentials ready to scan.

Note: If AD credentials specified during network discovery, System will verify and Scan the AD devices automatically.

Master Credentials:

Step 1:

Click on + button to start entering the Master Credentials

Step 2:

Fill In the required fields and enter save

Step 3:

Master credentials successfully added.

Note: If Master credentials available during network discovery, System will verify and Scan the AD devices automatically.

Assets: Will be able to view details pertaining to the devices discovered during agent installation,

Image RemovedImage Added

Will be able to perform many other actions when clicked on the action drop-down.

  • Edit:

    • When selected, We will be able to change the OS Type and Host IP and will be able to specify the criticality of the device scan.

    • Can enter the Tag Name as per the specifications described in the Popup. this is can be considered during the Patch update.

    • We can add the credentials of the device details such as User Name, Password, Domain name, and Port details of the device.

  • Details: Can view 3 categories of details such as Device Details, Vulnerabilities, and CIS Compliance

    • Device Details: will be able to view complete device details such as

Device Details

  • Device Info

  • Vulnerabilities Score

  • Vulnerabilities

  • Severity to CVSS score

  • Ports open

  • External Vulnerabilities

  • Compliance

  • SNMP

  • UPNP

  • SMB Shares

  • Zero Config

  • HTTP Data

  • Available patches

  • Installed software

  • Vulnerabilities: Under Vulnerabilities, we can view Authenticated and Unauthenticated Vulnerabilities.

    • Authenticated Vulnerabilities: This will be reflected once the specified device completes the Vulnerability scan.

    • Unauthenticated Vulnerabilities: This will be refected once the device discovery is completed.

  • CIS Compliance: This will be reflected once the specified device completes the compliance scan.

  • Vulnerability Report: Will be able to view the report pertaining to the complete Vulnerabilities of the device.

  • Compliance Matrix:

<<Need clarification >>

  • Compliance Report: Will be able to view the report pertaining to the complete Compliance of the device.

  • Image RemovedImage Added
  • Delete: Will be able to delete single or multiple assets at one go.

Global Actions

:

Under Assets, select a specific device and click on global action to get a drop-down with actions such as Assets scan, Add Tag, Vulnerability Scan, Windows Packages Scan, Compliance Scan and Delete.

  • Assets Scan: Discovery of the selected devices will be initiated when clicked on this button.

<< Need Clarification >>
  • for device discovery.

Step 1:

Image Added

Click on Company → click on company hyperlink

Step 2:

Image Added

Select single or multiple IP addresses → Click Global actions → Assets Scan

Step 3:

Image Added

Will get a popup on the successful discovery

Note: Visit job section for further process

  • Add Tag:

Step 1:

Select Add tag

Step 2:

Enter the required details

Note: Tag Name entered is considered during the Patch update. (Name mentioned is for reference only)

Step 3:

After a successful update, will get a confirmation pop-up

  • Vulnerability Scan

Step 1:

Select the device → click on Global action → select Vulnerability scan option to initiate the scan

Step 2:

Will receive a popup message on scan initiation

Step 3:

Once the system verifies credential and other required details in the backend will receive a status popup.

  • Windows Packages Scan

Step 1:

Select the device → click on Global action → select Windows Packages scan option to initiate the scan

Step 2:

Will receive a popup message on scan initiation

Note: Can check the data related to Windows Packages Scan in Reports.

Compliance Scan

Step 2:

Select the device → click on Global action → select Compliance scan option to initiate the scan

Step 2:

Will receive a popup message on scan initiation

Step 3:

Once the system verifies credential and other required details in the backend will receive a status popup.

Note: Can check the data related to Windows Packages Scan in Jobs

  • Delete

Company Vulnerabilities

In this category will be able to view the Active and Suppressed Vulnerabilities data with reports related to each specific.

  • Active Vulnerabilities

The system scan analyzes and displays OS wise asset vulnerabilities related to the selected company. The system further segregates the Vulnerabilities into Critical, High, Medium and low priorities. list of the Vilnerabilites can be viewed by clicking on the linked numbers under each category.

Critical

High

Medium

Low

  • Suppressed Vulnerabilities

Admin has the rights right to suppress the active Vulnerabilities based on the business rules of the company. The Suppressed Vulnerabilities can be viewed under this category.

Image Removed

Image Added

Assets Compliance

This category will be able to view the Active compliance rules which include compliant and non-compliant rules.

Operating System wise Compliant

Non Compliance:

Audit Log

Both Login Audit and System login details can be viewed under this Tab.

Image RemovedImage Added

Login Audit: In this details pertaining to users, browsers, devices, mail ID, OS… through which the system was accessed.

System Audit: System Operations related data that includes, Company creation, deletion, Agent Creation, Agent deletion, Discovery setting creation, Discovery setting deletion,… log details can be viewed in this section.

Settings

In this category, Will be able to customize creating Users, Roles, Download agent, Scheduler, Integration, Custom Compliance, web scanning, Software Repository.

Users

Step 1:

Click + button → Enter the required credentials→ click on Add ACL button → Select Companies → Specify the Role → Save

Step 2: Add ACL

The above table is popped up when clicked on Add ACL → Search or scroll to select single/Multiple Company Name → press '<' button.

Step 3:

Image RemovedImage Added

Find the popup with a successful update and can view the User created.

Roles

In this category, Roles can be defined with task rights.

Step 1:

Click + button → Enter the required credentials→ click on save→ Select Companies → Specify the Role → Save

Step 2:

Find the popup with a successful role creation and can view the Role created.

Schedulers

In this section, the Admin/ Authorised person can schedule (hourly, weekly, Monthly ) Scan such as Vulnerability Scan, Compliance, Asset discovery

Step 1:

Image RemovedImage Added

Click + button → Select Company→ → Select Scan → Specify the Role → Save

Step 2:

Image RemovedImage RemovedImage AddedImage Added

Can specify, time and date and click ok

Step 3:

Click on the Active button to set the Scheduler. Once the scheduler is set the scan happens automatically as per schedule.

Integration

<< Need Clarification>>

Custom Compliance << Need Clarification>>

Web Scanning << Need Clarification>>

By following these simple steps, Will be able to integrate Netalytics application with the Customer ticketing System. Tickets are automatically generated and tracked with this.

Step 1:

Image Added

Click settings → Integrations

Step 2:

Image Added

Click on the Ticket Mapping → Enter all required credentials → Save

Step 3:

Image Added

Can view, edit, and delete Credentials when clicked on Integration Mapping.

Image Added

Click on the action button to edit or delete the mapping credentials.

Software Repository

In this segment, Will have silent up-gradation of the selected dependency software. Once published it will move into software inventory for further patch installation.

Step 1: Software Information

Click + button → Add adequate software Information → Next

Step 2: Registry Details

Click on Add button to add more Key Fields

Step 3: Dependency Info

Select the dependency details for the dropdown and click save.

Will get a popup on successful patch repository creation

Download << Need Clarification>>

Software Inventory

This segment will be able to apply the patches that were installed in the Software repository. Once the patched are successfully applied will observe fall in Vulnerabilities count.

Dashboard: In Dashboard, we will be able to see the stats of the Company/Range that was specified during Agent Installation.