Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

What is Company Dashboard?

Consider this your company-level homepage, where you will find the company-built dashboards and additional company level settings that include Tag Rules, Company Settings, Company Details Update, Application Baseline, Integrations, CVE Search, and Alerts at the company level, which override Global Settings.

image-20240318-221203.png

The overview company dashboard provides a comprehensive view of data for a single company, multiple or all of them simultaneously. We provide over 20 pre-built dashboards that display your most important data. You can personalize the dashboard(s) using our filtering and editing features to suit your needs.


Company Dashboard - Table of Contents


Company Dashboard - Overview

The default dashboard will be ‘Overview,’ which can be changed using the drop-down to select a different option.

image-20240318-202837.png

The dashboard view you are currently on will be marked in the list drop-down by a checkbox as such:

image-20240130-204147.png

Some of the dashboard views will contain multiple pages that you can toggle between, as such:

image-20240130-204226.png

All dashboard views have additional filter options on the left-hand side filter icon.

image-20240123-222113.png

Set your desired filtering options, then tap APPLY FILTERS to view it in the dashboard.

image-20240130-204327.png

Company Dashboard - Details

The following dashboard views are available:

Category

Dashboard Name

Active Directory

AD Computers

Active Directory

AD GPOs

Active Directory

AD Groups

Active Directory

AD OUs

Active Directory

AD Users

Overview

Agent Details

Assets

Application Vulnerability

Assets

Asset Details

Active Directory

Azure AD Computers

Active Directory

Azure AD Groups

Active Directory

Azure AD Logs

Active Directory

Azure AD Microsoft Secure Score

Active Directory

Azure AD Roles

Active Directory

Azure AD Users

Vulnerability

CISA Vulnerabilities

Compliance

Compliance Standard PCI DSS

Compliance

Compliance Standard CIS

Compliance

Compliance Standard Cyber Essentials

Compliance

Compliance Standard Essential Eight

Compliance

Compliance Standard GDPR

Compliance

Compliance Standard GPG 13

Compliance

Compliance Standard HIPAA

Compliance

Compliance Standard ISO 27002

Compliance

Compliance Standard NIST 800 171

Compliance

Compliance Standard NIST 800 53

Compliance

Compliance Standard NIST CSF

Vulnerability

Critical Vulnerabilities

Assets

External Scan

Overview

Job Details

Assets

Network Vulnerabilities

Overview

Overview (default)

Assets

Port Details

Assets

Remediation Plan

Vulnerability

Suppressed Vulnerabilities

Vulnerability

Vulnerability Summary


Company Dashboard - Action Toolbar Overview

The action toolbar provides a set of actions to change the Company-level settings.

image-20240318-203037.png

Action

Description

Tag Rules

Add, Edit, or Delete existing tag rules for the selected company

Settings

Company level settings; override the Global level settings

see Details section below for additional information

Update Company Details

Tap to update the company details that include the Name, Description, City, State, Zip, Country, and Zip Code information

Integrations

Displays the Integrations list for the selected company

See V4 Integration Setup Guidesfor more information

CVE Search

Search the CVE database for the selected company; any data found will be displayed with asset link information

Alerts

Timeline style system events for the selected company

Getting Started

Displays the Getting Started menu


Company Dashboard - Action Toolbar Details

Tag Rules

Tag Rules enable you to specify search criteria (rules), which are used during the scan of all assets. If the search criteria is true, the system will apply the tag to the asset(s).

Edit or Delete Tag Rules

You will see any of the existing tag rules in the table view, where you can use the three-dot action menu to Edit or Delete.

image-20240318-212021.png

Add New Tag Rule

Tap the Add button to create a new tag rule.

image-20240318-212127.png

Complete all the required fields, which include Name, Risk Score, Collection, Description, and the Name/Value for the actual tag. You will also need to specify the Rules section which includes a Boolean for AND/OR with different field selections.

image-20240318-212205.png

Field

Description

Name

Give the tag rule a name of your choice

Risk Score

Enter a risk score if you want to modify the risk score of any asset where this rule matches. If you do not want to change the risk score, enter zero (0).

Collection

Select the Collection which organizes the tags by Assets, Ports, and Problems

Description

Give the tag rule a description of your choice

Rules

Used to build a search query with specific search criteria; the rule will check all assets for a match and apply the specified tag(s)

Tags: Name

Give the tag a name of your choice

Tags: Value

Give the tag a value of your choice (string or integer)

Auto Tags will be displayed on the individual asset details and can be viewed from the Assets table view.

image-20240318-212511.png

Company Settings

Company Ports Policy

Specify Insecure, Denied, Excluded, and/or Allowed Ports

Allowed ports, denied ports, and insecure ports are used for flagging the information on the asset Report Card. When you add the port number this will still scan the ports for vulnerabilities. You can use the exclude port option to exclude the ports from scanning.

image-20240318-212714.png

Company Deprecation Days

Set asset and/or Agent deprecation days and your Suppress Vulnerabilities days.

Deprecation is basically your inactive state. This keeps data in the portal without ‘deleting’ the asset/data.

image-20240318-213018.png

Company EDR Application

The Global EDR applications contain the list of antivirus applications shown in the security report card for the respective assets. Any application not listed as antivirus under Global EDR applications can be added here. Please run a scan after adding it to reflect the application name in the security report card of the respective asset. To Exclude any application from the Global EDR applications list, please click on the 'X' for the selected application.

image-20240318-213116.png

Company Backup Software

Any Backup Software not already listed under Backup Software can be added here. Please run a scan after adding it here to reflect the software name in the security report card for the respective asset.


To Exclude any of the Backup Software from the Global Backup Software list, please click on the 'X' for the selected software.

image-20240318-213143.png

Company Compliance Scan

Set the Compliance types to be scanned here. Only the selected options will be activated when running compliance scans. This will reduce the time it takes to complete and the load on the scan agents.

image-20240318-213239.png

LW Agent Scan Interval

Set your default scan interval for any installed Lightweight Agents for the selected company.

By default, the LWA will scan every 15 minutes if not changed.

image-20240318-213356.png

Company Remote Agent Install

By Enabling Remote Agent Install, you can install Lightweight Agents on the Probe Discovered Assets.

  • Windows assets where SMB is enabled

  • MAC assets with SSH enabled (based on port mapping in Discovery Settings and Credentials)

  • Linux assets with SSH enabled (based on port mapping in Discovery Settings and Credentials)

image-20240318-213607.png

Patching Status

Enable the ConnectSecure patching engine from the probe and lightweight agent type(s).

This feature requires additional setup under the Patch Scheduler and will not automatically start patching assets. Manual patching can be found under the company-level Patch Management module.

image-20240318-214105.png

Company Domain Scan

Enter a domain name to do a domain information lookup on SPF or MX records.

You can use the Attack Surface Mapper to view this information and provide reporting.

image-20240318-214232.png

Company Anti Ransomware

  • The Global Anti-Ransomware contains the list of anti-ransomware applications shown in the security report card for the respective assets.

  • Any application that is not already listed as antivirus under Global Anti-Ransomware can be added here.

  • Run a scan after adding to reflect the application name in the security report card of the respective asset.

  • To Exclude any application from the Global Anti-Ransomware list, please click on the '->' for the selected application.

image-20240318-214457.png

Company Brute Force Setting

Enabling the brute force setting requires you to specify ports to be scanned.

The following usernames are used for the brute force password scanning:

  • root

  • admin

  • administrator

  • webadmin

  • sysadmin

  • netadmin

  • guest

  • user

  • web

  • test

SNMP String Defaults

  • public

  • private

  • admin

image-20240318-214531.png

Company Firewall

  • The company Firewall contains the list of firewall applications shown in the security report card for the respective assets.

  • Any application that is not already listed as firewall under Global Firewall can be added here.

  • Run a scan after adding to reflect the application name in the security report card of the respective asset.

  • To Exclude any application from the Global Firewall list, please click on the '->' for the selected application.

image-20240318-215148.png


Company Excluded Component(s) from Security Report Card

This is your company-level option to exclude (remove) options from the Security Report Card.

image-20240318-215405.pngimage-20240318-215610.png

Update Company Details

Update any Company details, including the Company Name, Description, and Address information.

image-20240318-215750.png

Application Baseline

What is the Application Baseline?

We use the ConnectSecure Vulnerability Scan Agent to scan for any installed Application or Service on assets. Once identified, we classify them as either Denied or Mandatory based on the rules you configure. The results will then be published to the Application Baseline Results screens for either the Global or Company level views; links to detailed pages below.

Global Application Baseline Results

Company Application Baseline Results

Edit or Delete Tag Rules

This is where you manage your Application Baseline Rules that apply at the company level. Any existing Application Baseline Rules will display in the window and allow you to ‘Edit’ or ‘Delete’ by selecting the rule using the checkbox and tapping the perspective button.

image-20240318-215845.png

Add Tag Rules

Tap the ADD button to start a new rule; complete all required fields and tap Save.

image-20240318-215931.png

You can start typing directly into the Denied Application or Mandatory Application sections to query the scan results for the discovered application names.

image-20240318-220037.png

View your results under Assets > Company Application Baseline Results


Integrations

Tap to view any of the configured integrations for the selected company.

See V4 Integration Setup Guidesfor more details on the available integrations.

V4 Integration Setup Guides

Search CVE

Use the company-level CVE database search. Requires the Year and Article Number (YEAR-NNNNNN) format.

CVE data will be displayed and any affected assets in your portal.

image-20240318-220857.png

Alerts

View the timeline style system events for the selected company.

image-20240318-220941.png

Getting Started

Tap to view the Getting Started wizard; see the link below for additional information.

V4 Getting Started In App Info


Need Support?

Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login

image-20240206-144508.png
  • No labels