Skip to content
Login

Lucidum has been acquired by Cyderes → [Read the announcement]

Lucidum has been acquired by Cyderes → [Read the announcement]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Acquia Security
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • Barracuda CloudGen Firewall
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • Imprivata Privileged Access Management
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • Z
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Client Connector
      • Zscaler Deception
      • Zscaler Internet Access
      • Zscaler Private Access

Viewing Data

  • Overview of the Lucidum Data Model
  • Quick Start: Understanding Data in Your Lucidum System
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using MetaBlocks with Saved Queries
  • Using Queries with Nested Lists
  • Appendix: Fields in the Lucidum Data Group
  • Appendix: Data Types, Operators, and Regular Expressions

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Using MetaBlocks with Dashboards
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Introduction to Tags and Smart Labels
  • Overview of Tags
  • Migrating Custom Fields to Tags
  • Creating and Managing Tags
  • Overview of SmartLabels
  • Migrating Dynamic Fields to SmartLabels
  • Creating and Managing SmartLabels
  • Using Functions in SmartLabels
  • Using MetaBlocks with SmartLabels
  • Exporting and Importing SmartLabels
  • Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Overview of Value-Oriented SmartLabels
  • Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks
  • Exporting and Importing MetaBlocks
  • Example MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • SailPoint Actions
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Introduction to Risk
  • Risk Measurements

Use Cases

  • Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Incident Response
    • Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Endpoints for SmartLabels
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • API Token Management
  • Data Scheduler
  • License Settings
  • Notifications
  • System Preferences
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Introduction to Lucidum MoM
  • Adding Lucidum Systems (Deployments) to MoM
  • Adding Users to MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Viewing Data
  • Viewing Details about Individual Assets, Users, or Vulnerabilities

Viewing Details about Individual Assets, Users, or Vulnerabilities

Estimated Reading Time: 10 min read

Data Source, Lucidum Data Group, and Field Change History #

You can view details about the data for a single asset, user, or vulnerability.

There are three types of data in Lucidum, all of of which you can view in Lucidum and use in dashboards:

  • Data Source. Data sources map to Lucidum Connectors. For each asset, user, and vulnerability, you can view all the data sources from which Lucidum ingested data about the asset, user, or vulnerability. You can select a Data Source to exactly see which semi-raw data was provided by that data source. For example, you can see all semi-raw data ingested by the AWS connector.

  • Lucidum Data Group. Enriched data about assets, user, and vulnerabilities. Lucidum ingests data from multiple data sources and uses machine learning to deduplicate and triangulate data for each asset and normalize that data. The Lucidum Data Group tab allows you to view this enriched data for each asset, user, and vulnerability. Data in the Lucidum Data Group appears as fields in the Query tool.

  • Field Change History.  Displays a table of fields that have changed, including each field’s current value and its previous value. These are the fields that have changed in the last seven days.

Viewing Semi-Raw Data from the Data Source Tab #

All the data in Lucidum has been passed through Lucidum AI/ML before it reaches the Lucidum UI. However, there are some fields that further processed and then included in the Lucidum Data Group. Other fields are not further processed but are stored in Lucidum, are viewable in the UI, but are not included in the Lucidum Data Group. These fields are semi-raw data.

However, you can add semi-raw data fields to the Lucidum Data Group, so those values are available for use throughout the Lucidum product.

To view the semi-raw data in an asset record or user record:

  1. Follow the steps in in the section on Building the Query.
  2. In the Build a Query page, click the Show Results (page) icon in the lower right.
    query_or_condition_22.0.png
  3. In the Query Results page, find the asset, user, or vulnerability you are interested in. Click the > icon in the column farthest to the right.
    viewing_data_viewing_raw_asset1_24.0.png
  4. In the Viewing Details page, click the Data Sources tab.
    viewing_data_viewing_raw_asset2_24.0.png
  5. The Data Sources tab lists all the data sources that contributed to the asset record or user record.
  6. In the Viewing Details page, in the right pane, select a data source to see the data that Lucidum ingested from that data source about this asset, user, or vulnerability.
  7. In this example, we selected Symantec Endpoint Protection Computer from the left pane.
    • The right pane displays the data about this asset that Lucidum ingested from Symantec Endpoint Protection.
  8. For each data source, the Data Source tab displays First Ingestion Time.
  9. Note the toggle for Show Fields with No Content in the upper right. If you want to see all the possible fields Lucidum can ingest for an asset, enable this toggle.
    • You might see fields that are not populated. This means that Lucidum has not ingested that data from your environment, either because you have not yet configured the connector(s) and triggered data ingestion or because your environment doesn’t include that type of data.
  10. Only fields in the Lucidum Data Group appear in the Query tool. To add a field from a data source to the Lucidum Data Group, click its plus-sign. For details, see the section on Adding Fields to the Lucidum Data Group.

Viewing Enriched Data #

The Lucidum Data Group (LDG) is a dataset that includes real-world, verified, accurate, up-to-date data on cybersecurity and IT infrastructure.

  • Lucidum is agentless and ingests read-only API data from all the solutions in your environment, including IT, operations, development, business, network, security, and HR solutions, and structured and unstructured data from data lakes.

  • Lucidum transforms the ingested data using machine learning algorithms, network graph analysis, text mining, and data classification models to build an enriched, normalized dataset for all assets, users, data, and security postures in your environment.

    • For some of the ingested data, Lucidum lightly processes it using rules-based algorithms.

    • Lucidum pushes other ingested data through ML engines and then maps the data to fields in the LDG. These ML engines find relationships between assets, users, and data, determine the applications running on each asset, align all security data about vulnerabilities, risks, and misconfigurations with the appropriate assets, users, and datastores, and apply risk models.

    • Lucidum uses ML engines to deduplicate records for assets and users.

      • Lucidum examines usernames, email addresses, and other fields to deduplicate records for each user.

      • Lucidum uses serial numbers, FQDNs, MAC addresses, network graph analysis, and other fields to deduplicate assets.

      • Lucidum uses several text mining and data classification models to find details about data stores.

    • Lucidum normalizes values for asset name, asset type, OS category, OS version, status, username, and vendor, to prevent duplicate records and to enable consistent query results.

  • Lucidum stores the enriched, normalized dataset in the Lucidum Data Group (LDG). After processing, the LDG includes deduplicated, normalized, and accurate details about each user, each asset, and each data store.

To view the enriched data about an asset, user, or vulnerability:

  1. Follow the steps in in the section on Building the Query.

  2. In the Query page, click the Show Results (page) icon in the lower right.

    viewing_details_ldg_query_updated.png

  3. In the Query Results page, find the asset, user, or vulnerability you are interested in.

  4. Click the > icon in the column farthest to the right.

    viewing_data_viewing_raw_asset1_24.0.png

  5. In the Viewing Details page, click the Lucidum Data Group tab.

    viewing_data_viewing_ldg1_24.0.png

  6. In the Details page, in the left pane, select the category of enriched data you want to view. In our example, we selected Asset.

  7. After each ingestion, Lucidum:

    • Deduplicates records. For example, suppose an asset uses DHCP. Suppose Lucidum ingests different information about that asset each day. However, each day, that asset will lease a new IP address. Instead of creating multiple asset records, Lucidum creates a single record for that asset. The single record includes all the IP addresses associated with the asset over time.

    • Triangulates records. Suppose a single user appears in multiple solutions with multiple versions of a user name. For example, suppose Lucidum ingests a different name from Azure AD, GitHub, and Intune. Suppose Lucidum ingests the names “John.Smith”, “SmithJ”, and “[email protected]”. Lucidum creates a single entry for that user with a single user name and enriches the user record with information from Azure AD, GitHut, and Intune.

    • Aggregates records. Suppose Lucidum ingests data about an asset from CarbonBlack, Tenable, Intune, VMware, and InfoBlox. Each data source provides some information. Some of these data sources provide unique information. For example, one solution might provide OS and version, another solution might provide vulnerabilities, another solution might provide hardware information, another solution m7ight provide application data, and another solution might provide cloud information. Lucidum creates a single asset record that aggregates all the data from the multiple solutions.

    • Derives Data. Suppose you are interested in broader categories of data to provide a high-level overview in dashboards and reports. In these cases, Lucidum can strip out extraneous detail without losing accuracy. For example, suppose you are interested in operating systems running in your environment. Lucidum can provide you with a list of devices running Linux, Windows, and MacOs, regardless of the flavors or versions. Or suppose you want a list of all Windows 10 devices, regardless of the build of Windows 10.

  8. Note the toggle for Show Fields with No Content in the upper right. If you want to see all the possible fields Lucidum can ingest for an asset, enable this toggle.

    viewing_data_viewing_ldg2_24.0.png

  9. Notice that when toggled on, some of the fields are empty.

    • The populated fields in the LDG are dependent upon the data you have ingested with Lucidum connectors.

    • You might see fields that are not populated in your Lucidum system. This means that Lucidum has not ingested that data from your environment, either because you have not yet configured the connector(s) and triggered data ingestion or because your environment doesn’t include that type of data.

    • You also might see fields called “Extra Fields” in your Lucidum system that don’t appear in the list of fields. This means that Lucidum has ingested data from your environment that is not typically available in all environments.

  10. The Lucidum Data Group tab includes a category for Risk. This tab displays the Lucidum risk calculations for an asset and risk calculations by other data sources for the asset (if applicable).
  11. The Lucidum Data Group tab includes categories for Smart Labels and Tags. Note that in the Tags category, the Lucidum Data Group also displays the tags ingested from the source asset or user.

Adding Fields to the Lucidum Data Group #

Only fields in the Lucidum Data Group appear in the Query tool. If you want to use data from a data source in a Dashboard, Action, or SmartLabel, you must first add the data to the Lucidum Data Group.

NOTE: Although some semi-raw data appears in the Query Tool, you cannot include these fields in a Table chart until you add them to the Lucidum Data Group.

To add a field from a data source to the Lucidum Data Group:

  1. Follow the steps in in the section on Building the Query.
  2. In the Build a Query page, click the Show Results (page) icon in the lower right.
    query_or_condition_22.0.png
  3. In the Query Results page, find the asset, user, or vulnerability you are interested in. Click the > icon in the column farthest to the right.
    viewing_data_viewing_raw_asset1_24.0.png
  4. In the Viewing Details page, click the Data Sources tab.
    viewing_data_viewing_raw_data_promote_to_ldg_24.0.png
  5. The Data Sources tab lists all the data sources that contributed to the asset record or user record.
  6. In the Viewing Details page, in the right pane, select a data source to see the data that Lucidum ingested from that data source about this asset, user, or vulnerability.
  7. In this example, we selected SentinelOne Agent from the left pane.
  8. Suppose we want to promote the semi-raw data field CPU Cores. We click the Add to Lucidum Data Group icon (plus-sign) next to the field.
    viewing_data_viewing_raw_data_promote_to_ldg2_24.0.png
  9. In the Add Field to Lucidum Data Group modal page, we click Save.
  10. The promoted field appears in the Lucidum Data Group tab for the asset:
    viewing_data_viewing_raw_data_promote_to_ldg3_24.0.png
  11. To delete a promoted field from the Lucidum Data  Group, click the fields Delete icon (trashcan).

NOTE: If a promoted field is used in Dashboard, Action, or SmartLabel, you cannot delete the field from the Lucidum Data Group.

Viewing Field Change History #

The Field Change History tab displays a list of fields from the Lucidum Data Group that have changed. The Field Change History tab displays the current value and all the previous values for each changed field.

To view the change history for fields in an asset record or user record:

  1. Follow the steps in in the section on Building the Query.

  2. In the Query page, click the Show Results (page) icon in the lower right.

    viewing_details_changed_fields_query_2.png

  3. In the Query Results page, find the asset, user, or vulnerability you are interested in. Click the checkbox for that entry.

  4. Click the > icon in the column farthest to the right.

    viewing_details_changed_fields_query_results_2.png

  5. In the Viewing Details page, click the Field Change History tab.

    viewing_details_changed_field_2.png

  6. In the Field Change History page, you can expand each drawer (down arrow) and see a list of all values for a changed field and the time at which the change occurred.

What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on February 6, 2026
Viewing Data About All Assets, All Users, and All VulnerabilitiesViewing Details About Data Sources for Assets and Users
Table of Contents
  • Data Source, Lucidum Data Group, and Field Change History
  • Viewing Semi-Raw Data from the Data Source Tab
  • Viewing Enriched Data
  • Adding Fields to the Lucidum Data Group
  • Viewing Field Change History

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube

@ 2025 Lucidum, Inc. Design By Sandman Studios