Getting Started with Lucidum 5 Introduction to Getting Started with Lucidum First Step: User Accounts and Proxy Server Second Step: Connectors Introduction to Dashboards
Managing Users 4 Introduction to User Management Creating and Managing User Accounts Creating and Managing Roles Enabling SSO
Connectors 461 Introduction to Connectors Using Connectors Connectors FAQs List of Connectors List of Connectors 1 1E Tachyon A ADP AWS Abnormal Security Absolute B BambooHR Baramundi Barracuda CloudGen Access BeyondTrust BeyondInsight C Citrix Endpoint Management CyCognito Cyware Cymulate D DTEX InTERCEPT Dynatrace Duo Premier Druva Cloud Platform E EZOfficeInventory Extreme Networks ExtremeWireless WiNG ExtremeCloud IQ ExtraHop Reveal(x) F Fortra Vulnerability Management Freshservice FreeIPA Forward Networks G GYTPOL Guardicore Centra Security Platform GreyNoise Greenbone OpenVAS H HYPR Passwordless Hexagon HxGN EAM HubSpot HPE OneView I Ivanti Unified Endpoint Manager Ivanti Security Controls Ivanti Neurons for RBVM Ivanti Neurons for Modern Device Management (MDM) J Juniper Junos Space Juniper Junos JumpCloud Jira Cloud Platform K KnowBe4 Kolide K2 Keycloak Kaspersky Security Center L Lucidchart Lookout Mobile EDR LogRhythm SIEM LogMeIn Central M Mice&Men DNS Management Mosyle Monday.com Microsoft System Center Virtual Machine Manager (SCVMM) N Nutanix AHV Nucleus Nozomi Guardian NinjaOne O oVirt Outpost24 Sweepatic EASM Oracle Communications Unified Assurance (OCUA) Orca Cloud Visibility Platform P Pure Storage Pure1 Puppet Pulumi Pulseway Remote Monitoring and Management (RMM) Q Quip Quest KACE Endpoint Systems Management Appliance Qualys Global AssetView Qualys Cloud Platform (VM/PC) R Rubrik runZero Network Discovery Riverbed SteelCentral Controller RingCentral S SecurityScorecard Syxsense Secure Symantec Endpoint Protection Symantec Endpoint Management Suite T Tufin SecureTrack+ Trend Micro Worry-Free Services Trend Micro Vision One Trend Micro Cloud App Security U Uptycs UpGuard Vendor Risk Universal SSH Key Manager UniFi Controller V Vulcan Cyber VMware vRealize Automation SaltStack Config VMware vRealize VMware vCloud Director (VCD) W Workday Wiz WithSecure Elements Endpoint Protection WhatsUp Gold X Xton Access Manager Z Zscaler Deception Zoom Zerto ZeroFox
Streamlining Queries with Smart Labels and Tags 8 Introduction to Tags and Smart Labels Overview of Tags Migrating Custom Fields to Tags Overview of Smart Labels
Value-Oriented Dashboards (VODs) 7 Overview of Value-Oriented Dashboards Cloud Dashboards Endpoint Security Dashboards Identity Dashboards
Use Cases 32 Overview of Use Cases Full Inventory of Assets and Users Full Inventory of Assets for Providers Assets with End-of-Life Operating Systems Cybersecurity Regulations for the Kingdom of Saudi Arabia Overview of Cybersecurity Controls Asset Management Business Continuity and Disaster Recovery Cloud Security
Viewing Data 4 Introduction to Viewing Data in Lucidum Viewing Data About All Assets, All Users, and All Vulnerabilities Viewing Details about Individual Assets, Users, or Vulnerabilities Viewing Details About Data Sources for Assets and Users
Running Headless with Webhooks 5 Overview of Webhooks Creating a Webhook Configuration Creating Queries Creating a Webhook Action
Lucidum API v1 5 Introduction Tokens, Response Codes, Pagination, Methods, Caveats Authentication Endpoints
Lucidum API v2 9 Overview of Lucidum API v2 Authentication in API v2 Endpoints for Assets and Users Endpoints for Change Management
Sending Alerts to Slack 3 Introduction Installing and Configuring the Lucidum App Using the Lucidum App
Managing Your Lucidum System 3 Introduction to Managing Your Lucidum System License Settings System Settings