Getting Started
ConnectSecure has already signed you up for the new instance.
Please check Inbox for an email that looks like below:
To log into the portal please click on the portal link as shown in the picture above. Please click on the URL in this mail and log in using the username and password given in the mail.
Two-factor Authentication
Once username and password is entered, you will be redirected to set up authentication
Once the authentication is set, you will be redirected to the portal.
Please proceed to creating a new company
Creating a New Company
Navigate to the "Global View" and follow these steps to create a new company
1. Access Global View: Navigate to the "Global View" dashboard.
2. New Company: Locate the "Create New Company" option and click on it.
3. Fill in Details: Provide the necessary information for the new company, including Company name, description, and any other required details.
Save Changes: After filling in the details, save the changes to create the new company
Discovery Settings and Credentials
Note: |
If the scan is limited to workstations only (LIGHTWEIGHT), please skip the "Discovery Settings and Credentials" section and proceed. |
Once the company is created, proceed to configure Discovery Settings and Credentials. This section is an easy guide to the process.
Access Discovery Settings:
Within the newly created company, find the "Discovery Settings and Credentials" section.
Click on the Add button to Configure Address types
IP Range: Specify the IP ranges you want to include in the discovery process.
CIDR: Configure CIDR (Classless Inter-Domain Routing) settings for more granular control.
Static IP: Add specific static IP addresses for targeted discovery.
Domain Name: Include domain names for comprehensive coverage.
Save Changes: After adding credentials and configuring discovery settings, save the changes to apply the new configurations.
Add Credentials: Input the required credentials for accessing the network and systems you intend to discover.
Verify Credentials: Once credentials are added, perform a verification to ensure they are valid and can be used for scanning.
Choose an OS type to add master credentials: Windows, MacOS, Linux, VMware, and Network devices.
Depending on the network setup, select either Active Directory or Asset Credential as the credential type.
Agent Installation
Navigate to the “Agents” section and click on "Download Agent".
Copy the script by selecting the "Copy to Clipboard" option.
Next, run the copied script on the Windows or Mac system with administrator permissions.
Map Discovery Settings and Credentials to Agent
Navigate to the "Agents" section within the application.
Locate and click on the "Action Button" (often represented by three dots or a gear icon) associated with the specific agent that needs to be configured.
From the menu that appears, select "Map Discovery & Credentials"
In the "Map Discovery & Credentials" section, locate the options to associate Discovery Settings and Credentials with the selected agent.
Review and map the required Discovery Settings by selecting the appropriate settings from the available options.
Similarly, map the necessary credentials to the agent by choosing the relevant credentials from the list.
Once the Discovery Settings and Credentials are mapped, click the "Save" button to apply the changes.
After successfully mapping the Discovery Settings and Credentials, return to the "Agents" section.
Locate the agent that has been configured the under the Discovery Settings and Credentials.
Click on the "Scan" button to initiate the scanning process for the configured agent.
Assets
Go to the 'Company View'.
Click on 'Assets' to access the assets view.
In this section, is a comprehensive list of scanned assets.
The list includes assets along with their associated risk scores and vulnerability counts.
Clicking on the IP Address will redirect, to the detailed view of the chosen asset.
In this section, the following information about the assets are available:
System information
Storage
Network information
BIOS Information
Firewall Policy
Problems
Solutions
Firewall Rules
Internal Ports
External Ports
Software
Asset Patches
Extension Programs
Services
User Shares
For network vulnerabilities, please find the scripts to remediate them.
Please directly copy the script and run it on the machine for remediation.
Problems
Click on 'Assets' to access the Problems view.
In this section, all the problems related to assets at the company level can be identified.
In this section, one can choose to suppress Problems, by triggering an email to the designated user for approval. This user can be internal or external.
Remediation Plan
Click on 'Assets' to access the Remediation Plan.
The Remediation Plan lists missing OS (Operating System) security patches and the latest application versions that have not yet been installed.
Application Vulnerabilities
Click on 'Assets' to access the Application Vulnerabilities.
In this section, Application Vulnerabilities and missing OS (Operating System) security patches are listed.
Pending OS Patches
Click on 'Assets' to access the Pending OS Patches.
In this section, review the pending OS patches across the company's view.
Ports
Click on 'Assets' to access the Ports section.
In this section, review the Ports details across the company's view.
Vulnerabilities
Go to the 'Company View'.
Click on “Vulnerabilities” to access the Vulnerabilities view.
In this section, we can suppress vulnerabilities, triggering an email to the designated user for approval. This user can be internal or external.
Select the reason for suppressing the vulnerability.
User Type: Choose the user type for whom the suppression request is intended: Internal User or External User.
Suppression Comments: Provide comments explaining the justification for suppressing the vulnerability.
Suppression Start Date and End Date:
Specify the start and end dates for the vulnerability suppression.
Save: Click the "Save" button to approve the suppression request.
After completing these steps, the user will receive an email for approval. Upon approval, the request will proceed to the suppression stage.
Compliance
Go to the 'Company View'.
Click on “Compliance” to access the Compliance view.
In this section, access the compliance details for CIS, PCIDSS, HIPAA, Cyber Essentials, NIST 800-53, Essential Eight across multiple platforms such as Windows Server, Azure Server, Windows Desktop, Linux, and Mac.
And for Manual Compliance, to mark it as compliant or not applicable, there are provisions to upload evidence.
Active Directory
Click on “Active Directory” to access the Active Directory Section.
Problems
Identifies and lists issues or challenges.
AD Summary
Provides a summary of Active Directory-related information.
Azure AD Summary
Offers a summary of Azure Active Directory-related information.
Active Directory: Presents detailed information and insights related to the Active Directory.
Azure Active Directory: Provides detailed information and insights concerning Azure Active Directory.
Microsoft Secure Score: Offers information and metrics related to the security score assigned by Microsoft, indicating the overall security posture.
PII Scan
Click on “PII Scan” to access the PII Scan Section.
Add a scan profile
Click on +Add to add a new scan profile.
Scan settings
Under Scan Settings, choose all by selecting the Select All option. Users can select optional information from fields like Surname, Phone, Date Of Birth, Postal Code, OAuth Token, Location, Email, IP, Credit Card, Phone, SSN, and Street.
Select Default Extension
Select the Default Extension Type Select All option. Users can select optional extension types html, json, yaml, yml, tex, xml, ts, sh, wpd, php, go, cpp, c, js, xlsm.
Select the appropriate Source Type and an Agent to use for PII Scan.
Select the Default Source Type as Files to be used for this scan.
Select Source Type as Files and provide information for Path Settings such as Included Location(s). Exclude the Location for the system to be scanned.
Once all required fields are selected, please click on Save to successfully save the PII Profile with a message as Saved Successfully.
Initiate PII Scan
Locate and select the profile for which you want to initiate the PII scan.
Once the scan is complete, review the results to identify any flagged Personally Identifiable Information. This may include names, addresses, social security numbers, or other sensitive data.
Based on the scan results, take appropriate actions. This could involve redacting or encrypting sensitive information, notifying relevant parties, or implementing additional security measures.
Clicking on the highlighted PII data will redirect you to the detailed view of the chosen PII data.
Dashboard
On the right Pane, click on the Dashboard icon to be redirected to the Dashboard section. This area provides an overview of relevant information and data. Once in the Dashboard section, you can proceed to the next step.
Within the Dashboard section, you will find options to select the type of dashboard you wish to view. Dashboards may be categorized based on specific metrics, projects, or departments. Look for dropdown menus, tabs, or other navigation elements to make your selection.
After choosing the desired dashboard type, the system will display the corresponding information. Explore the various components and visualizations to gain insights relevant to your needs.