Table of Contents
Introduction
Purpose
Agent Configuation
Company
Assets
Vulnerability
Compliance
Software Inventory
Settings
Patch Management
Dashboards
Introduction
Purpose
Agent Configuration:
1. Installation Procedure
Company System Registration
Go to <URL>. Go to <tab>
Click on the ‘+’ button in the Company dashboard. Enter the Company Name, Agent Name, and the Company Description (optional).
You have successfully created the company.
Agent Installation
Download and Install the NetalyticsAgent.exe file.
Enter Server and Site ID for a successful installation
Note: Click on Continue without Agent installation button, If not willing to wait for registration
2. Scan all agent subnets
Will have an option to scan all agent subnets without providing subnet details in portal prior to agent installation,
You will receive an mail on a successful installation.
Have an option to download Server and Secret code for hassle-free entry
3.Agent Configuration
Download and Install
Click on “Settings”-> “Downloads”
Download Agent and run the exe. Agent will get installed.
Windows Protect your PC
Open the installed agent and select More info in Windows Protect your PC page. Select Run anyway to install the agent
License Agreement
You will find a popup screen asking permission to install Netalytics Agent. Click on YES and Select the radio button To accept the agreement option in the License Agreement popup and Click next for the further steps
Provide the destination location in which you would prefer to save the agent in Select destination popup screen. Once the path is defined, click on Next for the Agent configuration.
Note: By default, the system suggests “C:\Program Files (x86)\NetalyticsAgent “ this path to save the agent.
Key-in the Server and Secret code details optioned from Configuration information during Agent installation.
Finish the Installation by agreeing the terms and conditions
4.Asset Configuration
Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets.
If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.
On providing Static IP, the system scans the Vulnerabilities in that specific system.
If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company
To initiate the configuration
Step. 1: Select the CIDR | IP Range | Static IP
Save the IP address
Step 2: Save the IP Address
Step 3: Add Master Credentials
At this stage, you can specify the master credentials or just skip and finish the installation.
Note: Credentials can be added before you initiate the Vulnerability scan.
5.Summary
Once the configuration is successfully completed, the System generates an overall summary report on overall system specification
Click on the finish button and now the system is ready to scan Vulnerabilities
Company
Once Agent is installed successfully, click on the Company Icon on the Global tab and select the created company for further process.
Click on the Company Name, The page will get redirected to the company Dashboard. Once entered the page, will be able to view Company Dashdashboard, Assets, Vulnerabilities, Compliance, Audit Log and Report Tables
In the settings tab: Select Jobs to view the number of devices discovered in the specified range during Agent Installation, any failed jobs, and the status of Agent Configuration.
Select Discovery Tab: Have 4 credential options
1.SNMP Credentials: If SNMP credentials specified and saved during agent installation, The agent will automatically scan the network devices, as specified below.
2. IP Ranges: We have 3 types of IP ranges, CIDR, IP Range, and Static IP. Click on IP Range Type and select CIDR in the drop-down to specify start IP and IP range type and save to view
IP Ranges: CIDR
Step 1:
Click on + button to select the type of CIDR in the drop-down
Step 2:
Enter the IP range for which intended to discover and save
Step 3:
Select the IP ranges and Click on Start scan to discover the select IP ranges.
IP Ranges: IP Range
Step 1:
Click on + button to select the type of IP range in the drop-down
Step 2:
Select the type of IP range and enter the IP range for which intended to discover.
Step3:
Select the single or multiple IP ranges and click on Start Scan to discover the IP range.
IP Ranges: Static IP
Step 1:
Click on the + button, and select Static IP to Scan Single device.
Step 2:
Enter static IP and save
Step 3:
Select the static IP and click on Start Scan to discover the static IP.
Active Directory Credentials:
Step 1:
Click on + button to enter the AD credentials
Step 2:
Fill in the required details and click on Save Credentials to save.
Step 3:
The screen will reflect the AD credentials ready to scan.
Note: If AD credentials specified during network discovery, System will verify and Scan the AD devices automatically.
Master Credentials:
Step 1:
Click on + button to start entering the Master Credentials
Step 2:
Fill In the required fields and enter save
Step 3:
Master credentials successfully added.
Note: If Master credentials available during network discovery, System will verify and Scan the AD devices automatically.
Assets: Will be able to view details pertaining to the devices discovered during agent installation,
Will be able to perform many other actions when clicked on the action drop-down.
Edit:
When selected, We will be able to change the OS Type and Host IP and will be able to specify the criticality of the device scan.
Can enter the Tag Name as per the specifications described in the Popup. this is can be considered during the Patch update.
We can add the credentials of the device details such as User Name, Password, Domain name, and Port details of the device.
Details: Can view 3 categories of details such as Device Details, Vulnerabilities, and CIS Compliance
Device Details: will be able to view complete device details such as
Vulnerabilities: Under Vulnerabilities, we can view Authenticated and Unauthenticated Vulnerabilities.
Authenticated Vulnerabilities: This will be reflected once the specified device completes the Vulnerability scan.
Unauthenticated Vulnerabilities: This will be refected once the device discovery is completed.
CIS Compliance: This will be reflected once the specified device completes the compliance scan.
Vulnerability Report: Will be able to view the report pertaining to the complete Vulnerabilities of the device.
Compliance Matrix:
<<Need clarification >>
Compliance Report: Will be able to view the report pertaining to the complete Compliance of the device.
Delete: Will be able to delete single or multiple assets at one go.
Global Actions: Under Assets, select a specific device and click on global action to get a drop-down with actions such as Assets scan, Add Tag, Vulnerability Scan, Windows Packages Scan, Compliance Scan and Delete.
Assets Scan: Discovery of the selected devices will be initiated when clicked on this button.
<< Need Clarification >>
Add Tag:
Step 1:
Select Add tag
Step 2:
Enter the required details
Note: Tag Name entered is considered during the Patch update. (Name mentioned is for reference only)
Step 3:
After a successful update, will get a confirmation pop-up
Vulnerability Scan
Step 1:
Select the device → click on Global action → select Vulnerability scan option to initiate the scan
Step 2:
Will receive a popup message on scan initiation
Step 3:
Once the system verifies credential and other required details in the backend will receive a status popup.
Windows Packages Scan
Step 1:
Select the device → click on Global action → select Windows Packages scan option to initiate the scan
Step 2:
Will receive a popup message on scan initiation
Note: Can check the data related to Windows Packages Scan in Reports.
Compliance Scan
Step 2:
Select the device → click on Global action → select Compliance scan option to initiate the scan
Step 2:
Will receive a popup message on scan initiation
Step 3:
Once the system verifies credential and other required details in the backend will receive a status popup.
Note: Can check the data related to Windows Packages Scan in Jobs
Delete
Company Vulnerabilities
In this category will be able to view the Active and Suppressed Vulnerabilities data with reports related to each specific.
Active Vulnerabilities
The system scan analyzes and displays OS wise asset vulnerabilities related to the selected company. The system further segregates the Vulnerabilities into Critical, High, Medium and low priorities. list of the Vilnerabilites can be viewed by clicking on the linked numbers under each category.
Critical
High
Medium
Low
Suppressed Vulnerabilities
Admin has the rights to suppress the active Vulnerabilities based on the business rules of the company. The Suppressed Vulnerabilities can be viewed under this category.
Assets Compliance
This category will be able to view the Active compliance rules which include compliant and non-compliant rules.
Operating System wise Compliant
Non Compliance:
Audit Log
Both Login Audit and System login details can be viewed under this Tab.
Login Audit: In this details pertaining to users, browsers, devices, mail ID, OS… through which the system was accessed.
System Audit: System Operations related data that includes, Company creation, deletion, Agent Creation, Agent deletion, Discovery setting creation, Discovery setting deletion,… log details can be viewed in this section.
Settings
In this category, Will be able to customize creating Users, Roles, Download agent, Scheduler, Integration, Custom Compliance, web scanning, Software Repository.
Users
Step 1:
Click + button → Enter the required credentials→ click on Add ACL button → Select Companies → Specify the Role → Save
Step 2: Add ACL
The above table is popped up when clicked on Add ACL → Search or scroll to select single/Multiple Company Name → press '<' button.
Step 3:
Find the popup with a successful update and can view the User created.
Roles
In this category, Roles can be defined with task rights.
Step 1:
Click + button → Enter the required credentials→ click on save→ Select Companies → Specify the Role → Save
Step 2:
Find the popup with a successful role creation and can view the Role created.
Schedulers
In this section, the Admin/ Authorised person can schedule (hourly, weekly, Monthly ) Scan such as Vulnerability Scan, Compliance, Asset discovery
Step 1:
Click + button → Select Company→ → Select Scan → Specify the Role → Save
Step 2:
Can specify, time and date and click ok
Step 3:
Click on the Active button to set the Scheduler. Once the scheduler is set the scan happens automatically as per schedule.
Integration << Need Clarification>>
Custom Compliance << Need Clarification>>
Web Scanning << Need Clarification>>
Software Repository
In this segment, Will have silent up-gradation of the selected dependency software. Once published it will move into software inventory for further patch installation.
Step 1: Software Information
Click + button → Add adequate software Information → Next
Step 2: Registry Details
Click on Add button to add more Key Fields
Step 3: Dependency Info
Select the dependency details for the dropdown and click save.
Will get a popup on successful patch repository creation
Download << Need Clarification>>
Dashboard: In Dashboard, we will be able to see the stats of the Company/Range that was specified during Agent Installation.
Add Comment