Getting Started with Lucidum 5 Introduction to Getting Started with Lucidum First Step: User Accounts and Proxy Server Second Step: Connectors Introduction to Dashboards Use Cases for Dashboard
Managing Users 4 Introduction to User Management Creating and Managing User Accounts Creating and Managing Roles Enabling SSO
Connectors 467 Introduction to Connectors Using Connectors Connectors FAQs List of Connectors List of Connectors 1 1E Tachyon A Abnormal Security Absolute Adaptive Shield Addigy Admin By Request ADP Adobe Adobe Workfront Aha! Airlock Airtable Alcatel-Lucent OmniVista 2500 Alcide Alert Logic Cloud Insight AlertSite Appgate Software Defined Perimeter (SDP) Aqua Archer Integrated Risk Management Arista NDR Aruba Central Asana Asset Panda Atera Aternity Atlas Data Center Attivo BOTsink Automox Auvik Aviatrix Enterprise Platform AWS B BambooHR Baramundi Barracuda CloudGen Access BeyondTrust BeyondInsight BeyondTrust Endpoint Privilege Management BeyondTrust Password Safe BeyondTrust Privileged Identity BeyondTrust Privilege Management for Windows BigID BigTime Projector Bionic Bitbucket Bitdefender GravityZone bitFit BitSight Security Performance Management BlackBerry Unified Endpoint Management (UEM) Block 64 BlockBox BlueCat Enterprise DNS BlueCat Micetro DNS Management BMC Helix CMDB BMC Helix Discovery BMC TrueSight Presentation Server BMC TrueSight Server Automation Box Broadcom Symantec ProxySG Buildkite Burp Suite C CA Service Management CA Spectrum Cato SASE Canonical Ubuntu Landscape Censys Centrify Identity Services CFEngine ChangeGear Checkmarx SAST (CxSAST) Check Point CloudGuard Check Point Harmony Endpoint Check Point Infinity Chef Cherwell Service Management Chorus CIS-CAT Pro Cisco Identity Services Engine (ISE) Cisco Meraki Cisco Secure Endpoint Cisco TACACS Cisco Umbrella Cisco Vulnerability Management Citrix Endpoint Management Claroty CloudConnexa Cloudflare CoalfireOne Code42 Incydr Cohesity ColorTokens Xshield ConnectWise Automate CrowdStrike Falcon Endpoint Protection Platform CrowdStrike Falcon LogScale CSCDomainManager CyberArk Endpoint Privilege Manager (EPM) CyberCNS Cybereason EDR CyCognito Cyera CylancePROTECT Cymulate Cyware D Darktrace PREVENT Datadog DataLocker SafeConsole Datto Remote Monitoring and Management (RMM) Dayforce DefenseStorm Delinea Privilege Manager Delinea Secret Server Dell Avamar Dell Integrated Dell Remote Access Controller (iDRAC) Dell OpenManage Enterprise Device42 DigiCert CertCentral Digital Guardian DivvyCloud DNS Made Easy Docusign Domain Certificate Domotz Dragos Druva Cloud Platform DTEX InTERCEPT Duo Premier Dynatrace E Eclypsium Edgescan EfficientIP SOLIDserver DDI Elastic Endgame Eracent ExtraHop Reveal(x) ExtremeCloud IQ Extreme Networks ExtremeWireless WiNG EZOfficeInventory F F5 BIG-IP iControl F5 BIG-IQ Centralized Management F5 Distributed Cloud App Infrastructure Protection (AIP) FireMon Security Manager Flexera One FlexNet Manager Suite for Cloud Forcepoint Web Security ForgeRock Directory Services FortiClient Enterprise Management Server (FortiClient EMS) FortiEDR Fortify Software Security Center Fortinet FortiGate Fortra Vulnerability Management Forward Networks FreeIPA Freshservice G Gigamon GigaVUE-FM Gigamon ThreatINSIGHT GitHub GitLab GoDaddy Google Chronicle Google Cloud Google Workspace Drive Google Workspace Endpoint Manager Greenbone OpenVAS GreyNoise Guardicore Centra Security Platform GYTPOL H Halcyon Anti-Ransomware HashiCorp Consul HCL BigFix Heimdal Hexagon HxGN EAM HiBob HP Device Manager HPE Integrated Lights-Out (iLO) HPE Intelligent Management Center (IMC) HPE OneView HubSpot HYPR Passwordless I IBM Hardware Management Console (HMC) IBM MaaS360 IBM Maximo IBM Security Guardium IBM Security QRadar IBM SevOne Network Performance Management (NPM) IBM Security Randori Recon IBM Tivoli Application Dependency Discovery Manager (TADDM) iboss Zero Trust SASE (Secure Access Service Edge) iCIMS Icinga IGEL Universal Management Suite (UMS) Illumio Core Platform Imperva SecureSphere Database Activity Monitoring (DAM) INAP Infinipoint Zero Trust Workforce Access Platform Infoblox BloxOne DDI Infoblox NetMRI Intezer Protect Intel Data Center Manager (DCM) IP Fabric Island Enterprise Browser IT Glue iTop Ivanti Connect Secure Ivanti Endpoint Security Ivanti Neurons for Modern Device Management (MDM) Ivanti Neurons for RBVM Ivanti Security Controls Ivanti Unified Endpoint Manager J Jamf Pro Jamf Protect JetPatch JFrog Artifactory Jira Cloud Platform JumpCloud Juniper Junos Juniper Junos Space K Kandji Kaseya VSA Kaspersky Security Center Keycloak Kolide K2 KnowBe4 L Lacework Lakeside Systrack Lansweeper LastPass LaunchDarkly LibreNMS LimaCharlie LinkedIn Sales Navigator Litmos LogicMonitor LogMeIn Central LogRhythm SIEM Lookout Mobile EDR Lucidchart M MalwareBytes ManageEngine Endpoint Center ManageEngine OpManager ManageEngine OpUtils ManageEngine ServiceDesk Plus McAfee MVision Cloud Medigate Mice&Men DNS Management Microsoft Active Directory Microsoft Azure Microsoft Configuration Manager Microsoft Defender for Cloud Apps Microsoft Defender for Endpoint Microsoft Intune Microsoft Lync Microsoft Sentinel Microsoft SharePoint Microsoft System Center Virtual Machine Manager (SCVMM) Monday.com Mosyle N N-able Nagios Core Nagios XI Nasuni Nectus NetApp ONTAP NetBox NetBrain Netdisco Netskope NetSpyGlass Netwrix Privilege Secure New Relic Nexthink Infinity NinjaOne Nozomi Guardian Nucleus Nutanix AHV O Observium Obsidian Security Okta LDAP Okta SSO Omnissa Horizon 8 OnDMARC OneLogin Oomnitza openDCIM OpenLDAP OpenStack OpenText GroupWise OpenText NetIQ Advanced Authentication OpenText NetIQ Identity Manager OpenText Network Node Manager i OpenText Server Automation OpenText SiteScope OpenText Webroot Business Endpoint Protection Opsgenie OpsRamp Opsview OPSWAT MetaDefender IT Access Oracle Cloud Infrastructure Orca Cloud Visibility Platform Oracle Communications Unified Assurance (OCUA) Outpost24 Sweepatic EASM oVirt P PacketFence PagerDuty Palo Alto Networks Cortex XDR Palo Alto Networks Cortex Xpanse Palo Alto Networks IoT Security Palo Alto Networks Panorama Palo Alto Networks PAN‑OS Palo Alto Networks Prisma Cloud Compute Edition Palo Alto Networks Prisma Cloud CSPM Palo Alto Networks Prisma Cloud CWP Panorays PaperCut Parallels phpIPAM Ping Identity PingOne PK Protect Data Protection Platform PluralSight Portnox Cloud Pritunl PrivX Promisec Proofpoint Identity Threat Defense Proofpoint Insider Threat Management Proofpoint Targeted Attack Protection (TAP) Proofpoint Zero Trust Network Access (ZTNA) Proxmox Virtual Environment (VE) PRTG Network Monitor Pulseway Remote Monitoring and Management (RMM) Pulumi Puppet Pure Storage Pure1 Q Qualys Cloud Platform (VM/PC) Qualys Global AssetView Quest KACE Endpoint Systems Management Appliance Quip R Rancher Rapid7 InsightAppSec Rapid7 InsightCloudSec Rapid7 InsightIDR Rapid7 InsightVM (Cloud) Rapid7 InsightVM Rapid7 Nexpose Warehouse Red Canary Red Hat Ansible Automation Platform Red Hat Identity Management (IdM) Red Hat OpenShift RedSeal Reliaquest GreyMatter Digital Risk Protection (DRP) Ring Central RiskIQ Illuminate Riverbed SteelCentral Controller Rubrik runZero Network Discovery S Sage People SailPoint IdentityIQ SailPoint IdentityNow Sal Endpoint Management Salesforce Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE) Salesloft Samsung Knox SAP Concur Saviynt Enterprise Identity Cloud (EIC) Scale Computing HyperCore Schneider Electric EcoStruxure IT ScienceLogic ScopNET Sectigo Certificate Manager (SCM) SecureW2 JoinNow MultiOS Secureworks Taegis VDR Secureworks Taegis XDR SecurityScorecard Sensu Go SentinelOne Singularity Network Discovery SentinelOne Singularity XDR Sentry Server Message Block ServiceNow Shodan Signal Sciences SimpleMDM Site24x7 Skybox Firewall Assurance Slack Smartsheet Snipe-IT Snow Software Snyk SolarWinds Sonatype IQ Server SonicWall Network Security Manager SonicWall SonicOS Sophos Central Sophos Endpoint Protection SOTI MobiControl Spacewalk Specops Inventory Spiceworks Splunk StatusCake Sumo Logic Sunbird dcTrack Symantec Cloud Workload Protection (CWP) Symantec Control Compliance Suite (CCS) Symantec Data Loss Prevention (DLP) Symantec Endpoint Management Suite Symantec Endpoint Protection Syxsense Secure T Tableau Tailscale Tanium Discover TCPWave DDI TeamViewer Remote Management Tenable Cloud Security Tenable Nessus Tenable OT Security Tenable Security Center Tenable Vulnerability Management Teqtivity Thinkst Canary TOPdesk Enterprise Service Management (ESM) Torii Trellix Endpoint Security (HX) Trellix ePolicy Orchestrator Trend Micro Cloud App Security Trend Micro Vision One Trend Micro Worry-Free Services Tufin SecureTrack+ U UKG Pro UniFi Controller Universal SSH Key Manager UpGuard Vendor Risk Uptycs V Vectra AI Veeam Backup & Replication Venafi Trust Protection Platform Veracode Vercara UltraDNS VMware Carbon Black Cloud Audit and Remediation VMware Carbon Black Cloud Workload VMware Carbon Black Endpoint VMware Tanzu Application Service (TAS) VMware vCloud Director (VCD) VMware Virtualization Platform VMware vRealize VMware vRealize Automation SaltStack Config VMware Workspace ONE Vulcan Cyber W Wasp AssetCloud Wazuh WhatsUp Gold WithSecure Elements Endpoint Protection Wiz Workday X Xton Access Manager Z Zscaler Private Access Zscaler Internet Access Zabbix Zenoss Cloud ZeroFox Zerto Zoom Zscaler Deception Zscaler Client Connector
Dashboards 14 Overview of Dashboards Protected: Data for Dashboards Channels Viewing a Dashboard Viewing Charts Creating a Dashboard Creating a Chart Building Queries Saved Queries and Historical Queries Managing Charts Managing a Dashboard Exporting and Importing a Dashboard Protected: Appendix: Fields and Regular Expressions Appendix: Data Types and Operators
Value-Oriented Dashboards (VODs) 6 Overview of Value-Oriented Dashboards Protected: Cloud Dashboards Identity Dashboards Inventory Dashboards Security & IT Ops Dashboards Protected: Threat Intelligence Dashboards
Streamlining Queries with SmartLabels and Tags 9 Protected: Introduction to Tags and Smart Labels Protected: Overview of Tags Protected: Migrating Custom Fields to Tags Protected: Creating and Managing Tags Protected: Overview of SmartLabels Protected: Migrating Dynamic Fields to SmartLabels Protected: Creating and Managing SmartLabels Protected: Using Functions in SmartLabels Protected: Examples for Tags and SmartLabel
Value-Oriented SmartLabels (VOSLs) 2 Protected: Overview of Value-Oriented SmartLabels Protected: Using Value-Oriented SmartLabels
Actions 23 Overview of Actions Active Directory Actions Automox Actions AWS Actions Crowdstrike Falcon LogScale Actions Elastic Cloud Actions Email Actions Google Chronicle Actions HappyFox Actions Hunters Actions Jira Cloud Actions Microsoft Defender Actions Microsoft Sentinel Actions Microsoft Teams Actions Opsgenie Actions Rapid7 Actions ServiceNow Actions Slack Actions Snowflake Actions Splunk Actions Sumo Logic Actions Tenable Vulnerability Management Actions Webhook Actions
Use Cases 32 Protected: Overview of Use Cases Full Inventory of Assets and Users Full Inventory of Assets for Providers Assets with End-of-Life Operating Systems AWS Security Groups Azure Lift and Shift Binding Operational Directives Certificates About to Expire or Already Expired Cloud Resources and Cost How Secure Are Your Assets? Identity and Access Management Lucidum and Cyber Insurance Requirements Protected: Lucidum Normalization Microsoft Defender Missing Microsoft Sentinel Missing Sending Lucidum Data to Microsoft Sentinel Unencrypted Storage Zero-Day Vulnerabilities Zero-Day Vulnerabilities and CVEs Zombie Users and Improper Offboardings Cybersecurity Regulations for the Kingdom of Saudi Arabia Protected: Overview of Cybersecurity Controls Asset Management Business Continuity and Disaster Recovery Cloud Security Compliance Configuration Management Continuous Monitoring Data Classification and Handling Endpoint Security Protected: Incident Response Identification and Authentication Protected: Threat Management
Viewing Data 4 Introduction to Viewing Data in Lucidum Viewing Data About All Assets, All Users, and All Vulnerabilities Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities Protected: Viewing Details About Data Sources for Assets and Users
Running Headless with Webhooks 5 Overview of Webhooks Creating a Webhook Configuration Creating Queries Creating a Webhook Action Use Case: Sumo Logic
Lucidum API v1 5 Introduction Tokens, Response Codes, Pagination, Methods, Caveats Authentication Endpoints Protected: Examples
Lucidum API v2 10 Overview of Lucidum API v2 Authentication in API v2 Protected: Endpoints for Assets and Users Endpoints for Connectors and Connector Profiles Endpoints for Change Management Endpoints for System Metrics Pagination Response Codes Operators and Data Types Protected: Examples for Lucidum API v2
Sending Alerts to Slack 3 Introduction Installing and Configuring the Lucidum App Using the Lucidum App
Managing Your Lucidum System 4 Introduction to Managing Your Lucidum System Notifications System Settings License Settings