Skip to content
Login

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Videos
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Protected: Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using Queries with Nested Lists
  • Protected: Appendix: Fields and Regular Expressions
  • Appendix: Data Types and Operators

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Protected: Introduction to Tags and Smart Labels
  • Protected: Overview of Tags
  • Protected: Migrating Custom Fields to Tags
  • Protected: Creating and Managing Tags
  • Protected: Overview of SmartLabels
  • Protected: Migrating Dynamic Fields to SmartLabels
  • Protected: Creating and Managing SmartLabels
  • Protected: Using Functions in SmartLabels
  • Protected: Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Protected: Overview of Value-Oriented SmartLabels
  • Protected: Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Protected: Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Protected: Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Protected: Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Protected: Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • Data Scheduler
  • License Settings
  • Notifications
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Adding Lucidum Systems (Deployments) to MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Value-Oriented Dashboards (VODs)
  • Identity Dashboards

Identity Dashboards

Estimated Reading Time: 19 min read

The pre-built Value-Oriented Dashboards include the following identity dashboards:

  • Compliance: Okta MFA Status. Tracks compliance with MFA use (as tracked by Okta) and identifies non-compliant accounts.
  • Identities. This dashboard displays a table with a list of all users in Lucidum

  • Identity Overview. This dashboard displays information about users, their status (deprovisioned, suspended, unauthorized, unmanaged), and their access to your environment.

  • Unauth User Accounts. This dashboard displays information about users, their authentication status, and their access.

Required Connectors #

To find all the assets and users in your environment and also find information about SSO and identity management, Lucidum recommends you configure Lucidum connectors for:

  • The Endpoint Management solutions in your environment (for example, Jamf, Intune, Citrix Endpoint Management, Symantec Endpoint Management, Hexnode)

  • The Mobile Device Management solutions in your environment (for example, Addigy, Citrix Endpoint, Jamf Pro, Kandji)

  • The directory solutions in your environment (For example, Azure AD, Microsoft AD, Jump Cloud, PingOne, OpenLDAP,)

  • The SSO solutions and identify and access management solutions in your environment (for example, Okta, AWS IAM, PingOne, OneLogic, SecurAuth)

  • The DHCP solutions in your environment (For example, Infoblox, Efficient IP, BlueCat)

  • The VPN solutions in your environment (For example, Cisco AnyConnect, FortiClient, Palo Alto VPN, Citrix Gateway, Zscaler Private Access)

  • The cloud solutions in your environment (for example, AWS, Azure, Google Cloud, Oracle Cloud)

Syntax #

When you see :: in a query, this means that the query includes a field of type “nested list” (a table). For example, this query:

User Status::Source match okta AND User Status::Status match Deprovision or User Status::Status match Suspended.

looks like this in the Query Builder:

user_status_list.png

See Using Queries with Nested Lists for details on nested lists.

Compliance: Okta MFA Status #

The Compliance: Okta MFA Status dashboard tracks compliance with MFA. In this dashboard, MFA is provided by Okta. This dashboard identifies non-compliant accounts.

The Compliance: Okta MFA Status dashboard looks like this:

identity_compliance_mfa2.png

Base Query #

Most of the charts in this dashboard a query like the following:

  • Okta MFA Status exists AND Data Sources match Okta User AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED

  • This query looks for user records that include the field MFA Status, include data from the Okta User application, have been active in the last month, and are not deprovisioned in Okta.

Charts #

  • Percentage MFA Compliance. This chart displays the ratio of user accounts that use MFA and those that do not use MFA.
    • This chart uses the query Okta MFA Status exists AND Data Sources match Okta User AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names returned by the query.
    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the values from Data Source.

    • The Chart Type is “Pie”.

  • Total Okta Identities. This chart displays the total number of user accounts managed with Okta.
    • This chart uses the query Data Sources match Okta User AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  •  Total Identities with MFA Configured. This chart displays the total number of user accounts that use MFA.

    • This chart uses the query Okta MFA Status == TRUE AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Total Identities with MFA Not Configured. This chart displays the total number of user accounts that do not use MFA.

    • This chart uses the query Okta MFA Status == FALSE AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Active Okta Identities with MFA == TRUE. This chart displays details about the identities that use MFA, including user’s full name, location, department, and email.

    • This chart uses the query Okta MFA Status == TRUE FALSE AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the column values for the table. In this case, the chart displays columns for Person Full Name, Location, Department, and Email.

    • The Chart Type is “Table”.

  • Active Okta Identities with MFA == TRUE. This chart displays details about the identities that use MFA, including user’s full name, location, department, and email.

    • This chart uses the query Okta MFA Status == TRUE AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the column values for the table. In this case, the chart displays columns for Person Full Name, Location, Department, and Email.

    • The Chart Type is “Table”.

  • Active Okta Identities with MFA == FALSE. This chart displays details about the identities that do not use MFA, including user’s full name, location, department, and email.

    • This chart uses the query Okta MFA Status == FALSE AND Last Time Seen within past 1 month AND Okta User Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the column values for the table. In this case, the chart displays columns for Person Full Name, Location, Department, and Email.

    • The Chart Type is “Table”.

Identities #

The Identities dashboard lists all the identities in your Lucidum system and details about each identity.

The Identities dashboard looks like this:

identity_identities.png

Base Query #

  • This dashboart includes a single chart.

  • The chart uses the query Lucidum User Name exists to find all identities in your Lucidum system.

Charts #

  • This dashboart includes a single chart.

  • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Lucidum User Name, Data Sources, Person Full Name, Department, Location, First Time Seen, Last Time Seen.

  • The Chart Type is “Table”.

In the Lucidum Identity Database dashboard, you can view the following about each user:

  • Lucidum User Name. User name derived by Lucidum.

  • Data Sources. Data sources from which Lucidum ingested data about the user.

  • Person Full Name. User’s full name.

  • Department. Department aligned with the user.

  • Location. Location for the user.

  • First Time Seen. Date and time Lucidum first saw this user.

  • Last Time Seen. Date and time Lucidum most recently saw this user.

For each column name, you can:

  • Sort by ASC. Sort the results by this column, in ascending order.

  • Sort by DESC. Sort the results by this column, in descending order.

  • Pin to left. The column is pinned to the left border. When you scroll left to right to view all the columns, this column stays on the left border.

  • Pin to right. The column is pinned to the right border. When you scroll left to right to view all the columns, this column stays on the right border.

  • Filter. Allows you to filter the table by one or more columns in the results table.

  • Hide Column. Removes the column from the page.

  • Manage columns. You can include or not include one or more columns in the results table.

Identity Overview #

The Identity Overview dashboard provides details about all currently active identities, all currently disabled identities, and all new identities. The Identity Overview dashboard looks like this:

identity_identity-overview_22.0.png

Base Query #

Most of the charts in this dashboard use one of the following as a base query:

  • Lucidum User Name exists AND User Status::Lucidum Status match Enabled

    • This query looks for all identities in your Lucidum system that have a status of “Enabled”.

  • Lucidum User Name exists AND User Status::Lucidum Status match Disabled

    • This query looks for all identities in your Lucidum system that have a status of “Disabled”.

Charts #

  • Total Tracked Identities. This chart displays a count of all enabled users in the Lucidum system.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number.

  • Identity Growth (Weekly). This chart displays the number of users each week for the last 6 months.
    • This chart uses the query Record Generated Time within past 6 months AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays Record Generated Time.

    • The Chart Type is “Bar”.

  • Identities by Country. This chart displays the number of enabled users in each country.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Country Name.

    • The Chart Type is “Bar”.

  • Identities by Department. This chart displays the number of enabled users in each department.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays Department.

    • The Chart Type is “Bar”.

  • Identity Data Sources. This chart displays the number of enabled users that use data from each data source.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the Data Source.

    • The Chart Type is “Pie”.

  • Total Deactivated Identities. This chart displays a count of all disabled users in the Lucidum system.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Disabled.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number.

  • Depts. of Deactivated Identities. This chart displays the number of disabled users in each department.
    • This chart uses the query Lucidum User Name exists AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Department.

    • The Chart Type is “Bar”.

  • New Identities. This chart displays the number of new users added to your Lucidum system during the last month.
    • This chart uses the query First Time Seen within past 1 month AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number.

  • Departments of New Identities. This chart displays the number of new users in each department.
    • This chart uses the query First Time Seen within past 1 month AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Department.

    • The Chart Type is “Bar”.

  • Data Sources of New Identities. This chart displays the number of new users that use data from each data source.
    • This chart uses the query First Time Seen within past 1 month.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the Data Source.

    • The Chart Type is “Pie”.

  • Deactivated Identity Listing. This chart displays a table that lists the users that have been deactivated in the last month.
    • This chart uses the query Last Time Seen within past 1 month AND User Status::Lucidum Status match Disabled.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Lucidum User Name, Person Full Name, Department, Job Title, Last Time Seen.

    • The Chart Type is “Table”.

  • New Identity Listing. This chart displays a table that lists the users that have been added in the last month.
    • This chart uses the query First Time Seen within past 1 month AND User Status::Lucidum Status match Enabled.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Lucidum User Name, Person Full Name, Department, Country Name, Job Title, Email, First Time Seen, MFA Configured.

    • The Chart Type is “Table”.

Unauth User Accounts #

The Unauth User Accounts dashboard displays information about users, their status (deprovisioned, suspended, unauthorized, unmanaged), and their access to your environment.

The Unauth User Accounts dashboard looks like this:

identity_unauth-user-accounts_22.0.png

Base Query #

Most of the charts in this dashboard use the following base query:

Data Sources match okta

In this dashboard, we use Okta as an example. To edit these dashboards to match your environment, choose the Data Source that matches your SSO or identity solution.

Note that Okta uses the statuses “Deprovisioned” and “Suspended”. Other SSO or identity solutions might use different statuses. If you edit this dashboard to use a solution other than Okta, you should also edit the status values to match those used in your solution.

Charts #

  • Total Okta User and Application Accounts. This chart displays a count of all user accounts and application accounts in okta.

    • This chart uses the query Data Sources match okta

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number.

  • Deprovisioned/Suspended Okta User & App Accounts. This chart displays the number of okta users who have been deprovisioned or suspended.

    • This chart uses the query User Status::Source match okta AND User Status::Status match Deprovision OR User Status::Status match Suspended.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Non-Okta User Accounts Not in Okta at All & Exist Elsewhere. This chart displays the number of users who are active in your environment but not managed in Okta.

    • This chart uses the query Data Sources not match Okta AND Status Match active OR Status match attached OR Status match provisioned AND Status not match Deprovisioned. This query looks for user accounts where the data source is not okta, the account has not been deprovisioned in Okta, and the account is active, attached, or provisioned.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Unauthorized Users Deprovisioned/Suspended in Okta & exist elsewhere. This chart displays a count of user accounts that have been deprovisioned or suspended in Okta but that still exists in other applications.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match Deprovision OR User Status::Status match Suspended AND Data Sources match Oracle Cloud Users OR Data Sources match AWS SSO Identity Store OR Data Sources match runZero User OR Data Sources match Zoom User OR Data Sources match AWS Identitye and Access. This query looks for users that were previously in Okta and are either deprovisioned or sustepended in Okta but still active in Oracle, AWS, runZero, or Zoom.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Unauthorized Users Deprovisioned/Suspended in Okta, active elsewhere. This chart displays a count of users that were previously managed in Okta and are either deprovisioned or suspended in Okta but still active in Sentry, AWS, Aviatrix, Lacework, Cloudflare, Lucidum, or GCP and the user account is active, attached, or provisioned in these other applications.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match Deprovision OR User Status::Status match Suspended AND User Status::Lucidum Status match Enabled. This query looks for users that were previously managed in Okta and are either deprovisioned or suspended in Okta but still enabled in other applications.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum User Name.

    • The Chart Type is “Big Number”.

  • Okta User Seats By Application. This chart displays the top applications used by okta users.

    • This chart uses the query Data Sources match Okta User

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum User Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Applications::Name.

    • The Chart Type is “Bar”.

  • Non-Okta Accounts Not in Okta at All & Exist Elsewhere. This chart displays the name of users who are active in your environment but not managed in Okta.

    • This chart uses the query Data Sources not match Okta AND Status Match active OR Status match attached OR Status match provisioned AND Status not match Deprovisioned. This query looks for user accounts where the data source is not okta, the account has not been deprovisioned in Okta, and the account is active, attached, or provisioned.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Person Full Name and Department.

    • The Chart Type is “Table”.

  • Unauthorized Users Depov./Suspended in Okta & Exist Elsewhere. This chart displays the name of each user account that has been deprovisioned or suspended in Okta but that still exists in other applications.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match Deprovision OR User Status::Status match Suspended AND Data Sources match AWS Identity and Access Management OR Data Sources match AWS SSO Identity Store Or Data Sources match Oracle Cloud Users or Data Source match runZero User or Data Source match Zoom User . This query looks for users that were previously in Okta and are either deprovisioned or suspended in Okta but still active in AWS, Oracle Cloud, runZero, or Zoom.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Person Full Name and Department.

    • The Chart Type is “Table”.

  • Unauthorized Users Showing Asset Count. This chart displays the user names of users that were previously managed in Okta and are either deprovisioned or suspended in Okta but still appear as enabled in other applications.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match Deprovision OR User Status::Status match Suspended AND User Status::Lucidum Status match Enabled. This query looks for users that were previously managed in Okta and are either deprovisioned or suspended in Okta but still enabled in other applications.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, Person Full Name and Department.

    • The Chart Type is “Table”.

  • Non-Okta Accounts. This chart displays accounts that do not exist in Okta and the applications those accounts are still using.

    • This chart uses the query Data Sources not match okta AND Status match active OR Status match attached OR Status match provisioned AND Status not match DEPROVISIONED.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the Data Source. The slices show the applications where users are active

    • The Chart Type is “Pie”.

  • Unauthorized Users By Data Sources Reporting. This chart displays accounts that are deprovisioned or suspend in Okata and still appear in other applications.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match DEPROVISIONED OR User Status::Status match SUSPENDED AND Data Sources match AWS Identity and Access Management OR Data Sources match AWS SSO Identity Store OR Data Sources match Oracle Cloud Users OR Data Sources match runZero User ORData Sources match Zoom User. This query looks for Okta users that have been deprovisioned or suspended in Okta yet still appear in AWS, Oracle Cloud, runZero, or Zoom.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the Data Source that has unauthorized users.

    • The Chart Type is “Pie”.

  • Unauthorized Active Users By Data Sources Reporting. This chart displays accounts that are deprovisioned or suspend in Okata and still appear in other applications and are still enabled in Lucidum.

    • This chart uses the query User Status::Source match okta_user AND User Status::Status match DEPROVISIONED OR User Status::Status match SUSPENDED AND User Status::Lucidum Status match Enabled. This query looks for Okta users that have been deprovisioned or suspended in Okta yet still appear as enabled in Lucidum.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum User Names.
    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays the Data Source that has unauthorized users.
    • The Chart Type is “Pie”.
What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on September 17, 2025
Inventory Dashboards
Table of Contents
  • Required Connectors
  • Syntax
  • Compliance: Okta MFA Status
    • Base Query
    • Charts
  • Identities
    • Base Query
    • Charts
  • Identity Overview
    • Base Query
    • Charts
  • Unauth User Accounts
    • Base Query
    • Charts

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube X-twitter Facebook

@ 2025 Lucidum, Inc. Design By Sandman Studios

SOLUTIONS

COMPANY

RESOURCES

Solutions

  • Modernize Sec Ops
  • Risk & Vulnerability
  • Data Management
  • CISO Tool Kit

COMPANY

  • About Us
  • Testimonials
  • Patents

Resource Library

  • Documentation
  • E-Books
  • White Papers
  • Videos
  • Blogs