Skip to content
Login

Lucidum has been acquired by Cyderes → [Read the announcement]

Lucidum has been acquired by Cyderes → [Read the announcement]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Acquia Security
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using MetaBlocks with Saved Queries
  • Using Queries with Nested Lists
  • Appendix: Fields in the Lucidum Data Group
  • Appendix: Data Types, Operators, and Regular Expressions

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Using MetaBlocks with Dashboards
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Introduction to Tags and Smart Labels
  • Overview of Tags
  • Migrating Custom Fields to Tags
  • Creating and Managing Tags
  • Overview of SmartLabels
  • Migrating Dynamic Fields to SmartLabels
  • Creating and Managing SmartLabels
  • Using Functions in SmartLabels
  • Using MetaBlocks with SmartLabels
  • Exporting and Importing SmartLabels
  • Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Overview of Value-Oriented SmartLabels
  • Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks
  • Exporting and Importing MetaBlocks
  • Example MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Endpoints for SmartLabels
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • API Token Management
  • Data Scheduler
  • License Settings
  • Notifications
  • System Preferences
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Introduction to Lucidum MoM
  • Adding Lucidum Systems (Deployments) to MoM
  • Protected: Adding Users to MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Using Queries
  • Appendix: Fields in the Lucidum Data Group

Appendix: Fields in the Lucidum Data Group

Estimated Reading Time: 24 min read

Fields are dependent upon the Lucidum object specified in the Build Query from field.

The Build Query from field specifies an object to examine. Choices are:

  • Asset

  • User

  • Asset-IP Mapping

  • User-IP Mapping

  • Vulnerability

Fields are characteristics of a Lucidum object. For example, a characteristic of a user is the user’s email address. A characteristic of an asset is the asset’s IP address.

Data Source and Lucidum Data Group #

Lucidum ingests information about assets, users, and data from your environment. Lucidum then deduplicates, triangulates, and aggregates that information to provide you with enriched data about assets, users, and vulnerabilities.

There are two types of data in Lucidum:

  • Data Source. Data Sources contain the raw data that is ingested by Lucidum collectors from your environment. For example, Data Sources can include Tenable, SentinelOne, Infoblox, Active Directory, AWS, VMware. Within each Data Source is the raw data collected by Lucidum for an asset. For example, an Active Directory data source for an asset would include the information you would expect to find in an Active Directory record for that asset.

  • Lucidum Data Group. After ingestion, Lucidum cleans up the raw data and fills the gaps between security solutions. After ingesting data from connectors, Lucidum enriches that data through machine learning.

This chapter describes the fields in the Lucidum Data Group. However, you use the Data Sources page to view all the raw data in your environment. And you can view the raw data for a query result in the Data Sources tab of the Details page (Explore button > Query Builder > New Query > Show Results > details icon)

Note that the list of fields in your Lucidum system is dependent upon the data you have collected with Lucidum connectors.

You might see fields in this appendix that don’t appear in your Lucidum system. This means that Lucidum has not fetched that data from your environment, either because you have not yet configured the connector(s) and triggered data ingestion or because your environment doesn’t include that type of asset.

You might see fields called “Extra Fields” in your Lucidum system that don’t appear in the list of fields in this appendix. This means that Lucidum has fetched data from your environment that is not typically available in all environments.

The list of fields that appear in your Lucidum system are the fields you can use to build queries.

Lucidum Data Group #

The following fields appear in the Lucidum Data Group. You can include these fields in queries.

Age #

Field

Description

Type

Agent Status

Status of the agent running on the asset.

String

First Ingestion Time

Earliest timestamp associated with the Lucidum ingestion session for the asset or user

Date/Time

First Time Seen

Earliest timestamp associated with data from the asset, user, or vulnerability

Date/Time

Hire Time

Employee hiring epoch time

Date/Time

IP Assignment End Time

IP address assignment end epoch time

Date/Time

IP Assignment Start Time

IP address assignment start epoch time

Date/Time

Last Lockout Time

User last locked out epoch time (from LDAP)

Date/Time

Last Password Set Time

User last password set epoch time (from LDAP)

Date/Time

Last Start Time

Timestamp from most recent boot of the asset

Date/Time

Last Time Patched

Most recent timestamp associated with patching for the asset

Date/Time

Last Time Scanned

Most recent timestamp associated with a vulnerability scan for the asset

Date/Time

Last Time Seen

Most recent timestamp associated with data from the asset, user, or vulnerability

Date/Time

Life

Life (in human-readable format)

String

Life (Hours)

Time in number of hours that data from the asset or user has existed in Lucidum

Float

Lucidum License Expiration Time

Timestamp for Lucidum license expiration.

Date/Time

Lucidum Status

Current status of an asset. Possible values are:

  • Bypass

  • Not Listed

  • Offline

  • Online

  • Pending

String

New Asset (yes/no)

Specifies whether asset is new

Binary/Boolean

New User (yes/no)

Specifies whether the use is new

Binary/Boolean

NVD Last Modified Time

Date and time the vulnerability was last modified in the NIST National Vulnerability Database

Date/Time

NVD Published Time

Date and time the vulnerability was first published in the NIST National Vulnerability Database

Date/Time

Record Generated Time

Earliest timestamp associated with the Lucidum ingestion session for the asset, user, or vulnerability

Date/Time

Status

Status of the asset

String

Terminate Time

Employee termination epoch time

Date/Time

Applications #

Field

Description

Type

Applications

List of applications associated with the asset or user

Nested values are:

Applications::Name

Applications::Source

Applications::Version

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Critical Risk Apps

Number of critical risk applications

Integer

Critical Risk Apps List

Critical risk applications

List

High Risk Apps

Number of high risk applications

Integer

High Risk Apps List

High risk applications

List

SaaS Application

SaaS application name (e.g., Okta)

String

SaaS Application Description

SaaS application description

String

SaaS Application Events

SaaS application events history

List

SaaS Application Type

SaaS application type (e.g., SSO)

String

SaaS Application Version

SaaS application version

String

User Agent

User agent detected

String

Asset #

Field

Description

Type

# of Assets

Number of assets linked to the user or vulnerability

Integer

Asset Category

Category for the asset. For example, “cloud” or “on-prem”.

String

Asset Function

Asset functional category. For example, “network” or “endpoint”

String

Asset Group ID

Asset group ID

String

Asset Groups

Groups associated with the asset

List

Asset LDAP Groups

Asset LDAP CN groups

List

Asset LDAP Group Members

Asset LDAP full group members

String

Asset Type

Asset type. For example, “server” or “workstation”

String

Auto Scaling Group

Asset auto-scaling group name (e.g., AWS EC2 auto-scaling group)

String

Cluster Config

Cluster configuration. For example, “VMWare”

List

Cluster ID

 Cluster ID

String

Cluster Name

 Cluster name

String

Critical Asset (yes/no)

True if the asset is critical according to data source

Binary/Boolean

Data Center ID

 Data center ID

String

Encrypted (yes/no)

True if the asset is encrypted

Binary/Boolean

Full Domain Name

Fully qualified domain name

List

Host ID

Host ID

List

Instance ID

 AWS instance ID

String

Instance Name

AWS instance name

String

Instance Type

AWS instance type

String

IP Address

IP address(es)

List

Latest Asset Name

Of all available data sources, asset name with the latest timestamp

String

Live Migration Enabled (yes/no)

True if the live migration is enabled (e.g., VMWare VMotion)

Binary/Boolean

Lucidum Asset Name

Asset name derived with Lucidum ML

String

Lucidum Asset Type

Asset type derived with Lucidum ML. Standardized and similar to normalized data.

String

Lucidum OS Category

OS Category derived with Lucidum ML. Standardized and similar to normalized data. For example, “Linux”, “Windows”.

String

Lucidum OS Version

OS version derived with Lucidum ML. Standardized and similar to normalized data.

String

Lucidum Status

Current status of an asset. Possible values are:

  • Bypass

  • Not Listed

  • Offline

  • Online

  • Pending

String

Lucidum Vendor

Vendor name derived with Lucidum ML. Standardized and similar to normalized data.

String

MAC Address

MAC address(es)

List

Multi-Host Access (yes/no)

True if the asset has multiple-host access

Binary/Boolean

OS and Version

OS and version

String

Public IP Address

Public IP address(es)

List

Resource Pool

Asset resource pool

String

Snapshot (yes/no)

True if the asset is snapshot

Binary/Boolean

Source Asset Name

Name of the asset as fetched from the source connector

String

User’s Assets

The asset(s) linked to the user

The nested values include:

User’s Assets::Asset

User’s Assets::First Ingestion Time

User’s Assets::First Time Seen

User’s Assets::Last Time Seen

User’s Assets::OS

User’s Assets::Source

User’s Assets::Source User

User’s Assets::Type

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

vCenter ID

 ID for the VMware vCenter

List

Vendor

 Name of the vendor

String

VM ID

Virtual machine ID

List

Cloud #

Field

Description

Type

Cloud Account

Cloud account name(s)

String

Cloud Account ID

Cloud account ID(s)

String

Cloud Asset (yes/no)

True if the asset is in cloud

Binary/Boolean

Cloud Instance ID

ID of Cloud instance

String

Cloud Stack

Name of Asset stack

String

CloudTrail Bucket

Name of CloudTrail bucket

String

CloudTrail Global-Service (yes/no)

True if CloudTrail includes API calls from global services

Binary/Boolean

CloudTrail Log (yes/no)

True if asset is logged in CloudTrail

Binary/Boolean

CloudTrail Log Group

Name of CloudTrail log group

String

CloudTrail Multi-Region (yes/no)

True if CloudTrail is enabled in multiple regions

Binary/Boolean

CloudTrail Name

Name of CloudTrail

String

CloudTrail Resource

Name of CloudTrail resource

String

CloudWatch Log Group

Name of Cloudwatch log group

String

Cluster Name

Name of Cloud micro-service cluster

String

Idle Instance (yes/no)

True if the cloud instance may be idling

Binary/Boolean

Image Creation Time

Date and time Cloud instance image was created

Date/Time

Image ID

Cloud image ID

String

Image Name

Cloud image name

String

Instance Key

Cloud instance SSH key name

String

Instance Name

Name of Cloud instance

String

Instance Profile

Profile/role associated with the Cloud instance

String

Instance Type

Type associated with the Cloud instance

String

Monthly Cost (US Dollar)

Monthly running costs (in US dollar)

Float

Old Image (yes/no)

True if the instance image is older than 30 days

Binary/Boolean

Old Image Age

Age in months of Old image

Integer

Parent Image ID

Id of the parent image for the Cloud instance

String

Public Image (yes/no)

True if the instance image is public

Binary/Boolean

Target Group

Target groups for the Load balancer

String

Task Definition

Name of the task definition for the Container service

String

Volume ID

Cloud volume ID attached to the instance

String

Compliance #

Field

Description

Type

# of Non-Compliance

Number of non-compliances

Integer

CloudTrail Validation (yes/no)

True if CloudTrail log file validation is enabled

Binary/Boolean

CloudWatch Alarm

Name of Cloudwatch alarm

String

CloudWatch Filter

Name of Cloudwatch filter

String

CloudWatch Filter Pattern

Cloudwatch filter pattern

String

CloudWatch Metric

Name of Cloudwatch metric

String

CloudWatch Metric Space

Cloudwatch metric space

String

Compliance Entity

Compliance entity

String

Compliance Source

Compliance source

String

Compliance State

Specifies whether asset meets compliance parameters. Possible values are “Compliant” and “Noncompliant”

String

Logging Enabled (yes/no)

True if the asset logging is enabled

Binary/Boolean

MFA Configured

MFA configuration status of the user

List

Missing Patch List

List of missing system patches

List

Missing Patches

Number of missing system patches

Number

Non-Compliance List

Non-compliance list

List

Replication Enabled (yes/no)

True if the asset replication is enabled (e.g., s3 bucket replication)

Binary/Boolean

Root Access (yes/no)

True if the cloud account has root access enabled

Binary/Boolean

Root MFA Enabled (yes/no)

True if the cloud account has root MFA enabled

Binary/Boolean

Security Findings

Asset security/compliance findings

The nested values include:

Security Findings::Last Time Seen

Security Findings::Rule

Security Findings::Source

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Versioning Enabled (yes/no)

True if the asset versioning is enabled

Binary/Boolean

Data #

Field

Description

Type

Bucket User Access

File bucket’s user access history

Nested values are:

Bucket Permission::Permission

Bucket Permission::User

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Bucket Users

Bucket user access history

List

Cloud Bucket

File bucket names

List

Cloud Files

Bucket files

List

Data Category

Lucidum extrapolated data category

String

Data Classification

Lucidum extrapolated data classification

String

Data Description

Lucidum extrapolated data topic keywords

String

Data Risk

Lucidum extrapolated data risk (higher value, riskier)

Integer

Data Store ID

Data store ID

List

File Folder

File folder names

List

File List

File access history

The nested values include:

File List::Source

File List::File Name

File List::File Access Datetime

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Data Source #

Field

Description

Type

Data Source Details

Data Source Details can be very helpful. This field allows you to search by the raw fields collected by Lucidum, including fields like Connector Group and Connector profile.

The nested values include:

Data Source Details::Agent Enabled (True/False)

Data Source Details::Agent Version

Data Source Details::Asset Description

Data Source Details::Cloud Account

Data Source Details::Cloud Account ID

Data Source Details::Connector Group

Data Source Details::Connector Profile

Data Source Details::Connectors

Data Source Details::Data Sources

Data Source Details::Encrypted (True/False)

Data Source Details::Expiry Time

Data Source Details::First Time Seen

Data Source Details::Instance Name

Data Source Details::IP Address

Data Source Details::Last Logon Time

Data Source Details::Last Time Seen

Data Source Details::Location

Data Source Details::Lucidum Asset Name

Data Source Details::Lucidum Asset Type

Data Source Details::Lucidum OS Category

Data Source Details::Lucidum OS Version

Data Source Details::Lucidum Status

Data Source Details::Lucidum User Name

Data Source Details::Lucidum Vendor

Data Source Details::OS and Version

Data Source Details::Serial Number

Data Source Details::Source Asset Name

Data Source Details::Source User Name

Data Source Details::Status

Data Source Details::User Disabled (True/False)

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Data Sources

List of data sources

List

DevOps #

Field

Description

Type

Docker Image ID

Hash Id of docker image digest

String

Docker Repo

Name of docker repository

String

Extra Fields #

Description

Type

Extra Fields

Fields that are not typically available in all environments.

Nested values include:

Extra Data::Key

Extra Data::Value

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Hardware #

Field

Description

Type

Carrier

Mobile carrier

String

CPU Average Usage (%)

CPU average usage (%)

Float

CPU Cores

Number of CPU cores

Integer

Hardware Config

Hardware configuration (e.g., VMWare)

Nested values include:

Hardware Config::Backing

Hardware Config::Summary

Hardware Config::Type

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

IMEI #

Mobile MEID/IMEI/ESN number

String

MAC Vendor

MAC hardware vendors

List

Memory Size (GB)

Memory size (in GB)

Float

Memory Usage (%)

Latest memory usage (%)

Float

Mobile #

Mobile/phone number

String

Model

Hardware model

String

Power State

Asset power state

String

Serial Number

Hardware serial number

String

Service Tag

Asset IT service tag

String

SIM #

Mobile SIM card number

String

Storage Size (GB)

Storage size (in GB)

Float

Storage Usage (%)

Latest storage usage (%)

Float

Vendor Class

Asset DHCP vendor class

String

Volume ID

Volume ID attached to the instance

String

Life Cycle #

Field

Description

Type

Asset Expiry Time

Asset lifecycle expiry epoch time

Date/Time

Purchase Order

Asset purchase order number

String

Purchase Price

Asset purchase price

Float

Purchase Quantity

Asset purchase quantity

Integer

Purchase Source

Asset purchase source

String

Purchase Time

Asset purchase epoch time

Date/Time

Warranty Expiry Time

Asset warranty expiry epoch time

Date/Time

Location #

Field

Description

Type

Building

Building name

String

Country Code

Location country ISO code

String

Country Name

Location country name

String

Environment

Environment

String

Latitude

Location latitude

Float

Longitude

Location longitude

Float

Location

Location

String

Rack

Rack name

String

Region

Region name

String

Site

Site name

String

Lucidum #

These fields are derived from raw data from data sources and then normalized for easy use in queries and dashboards.

Field

Description

Type

Lucidum Asset Name

Name of the asset

String

Lucidum Asset Type

Asset type. Possible values are:

  • Certificate

  • Code

  • Computer

  • Container

  • Database

  • DNS

  • Domain

  • Facility

  • Generic

  • Image

  • IoT

  • License

  • Microservice

  • Mobile

  • Network

  • Power

  • Server

  • Service

  • Storage

  • Workstation

String

Lucidum License Expiration Time

Date and time that the Lucidum license expires

Date/Time

Lucidum OS Category

Manufacturer of the OS. Possible values are:

  • Android

  • Arista

  • CheckPoint

  • Cisco ASA

  • Cisco Hyperflex

  • Cisco IOS

  • Cisco IOS-XE

  • Cisco ISE

  • Cisco Linksys

  • Cisco MDS

  • Cisco Meraki

  • Cisco NX-OS

  • Cisco WLC

  • Dell

  • Dish Network

  • Embedded

  • EMC

  • ExtremeOS

  • F-5 Networks

  • FORTINET

  • Generic

  • Hitachi NAS

  • IBM i5OS

  • IBM OS/390

  • iOS

  • Linux

  • macOS

  • Microsoft Windows

  • NetApp

  • Novell

  • Nutanix

  • Palo Alto

  • Palo Alto Networks

  • Polycom

  • Ruckus

  • Sun

  • tvOS

  • Unix

  • VMware

  • VMware ESXi

  • VMware NSX

  • Windows

  • Xbox 360

String

Lucidum OS Version

Version of the OS. For example, CentOS 7.9-2009, macOS 12.1, Windows 10, Windows Server 2022

String

Lucidum Status

Current status of an asset. Possible values are:

  • Bypass

  • Not Listed

  • Offline

  • Online

  • Pending

String

Lucidum User Name

User name

String

Lucidum User Status

Status of user account. Possible values are:

  • Disabled

  • Enabled

String

Lucidum Vendor

Vendor associated with an asset

String

Network #

Field

Description

Type

Certificate Algorithm

SSL certificate encryption algorithm

String

Certificate ID

SSL certificate ID

String

Certificate Rating

SSL certificate rating

String

Certificate Version

SSL certificate protocol version

String

DNS CNAME

DNS canonical name record

String

DNS MX

DNS mail exchange record

String

DNS Name

DNS name

String

DNS NS

DNS nameserver record

String

DNS PTR

DNS pointer record

String

DNS Requested Domain

DNS requested domain

String

DNS Security

DNS security status

String

DNS Type

DNS record type

String

DNS Zone

DNS zone

String

Domain

Asset domain name

String

External Ports

Open ports accessible externally

List

External Services

Services accessible externally

List

Firewall Action

Firewall default action

String

Firewall Rules

Firewall rules

The nested values include:

Firewall Rules::Action

Firewall Rules::Name

Firewall Rules::Override Action

Firewall Rules::Priority

Firewall Rules::Statement

Firewall Rules::Visibility

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Instance Key

Instance key name

String

Internet Gateway ID

Internet gateway ID

String

IP Pool

IP address pool

String

ISP

Public internet service provider according to source or extrapolated by Lucidum

String

Management VIP

Management virtual IP (VIP) address

String

NAS ID

NAS ID

String

NAS Port

NAS port

Integer

NAT Gateway ID

NAT gateway ID

String

Network ACL ID

Network access control (ACL) ID

String

Network Config

Network configuration (e.g., VMWare)

The nested values include:

Network Config::Interface

Network Config::Protocol

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Network ID

Network ID

List

Network Interface ID

Network interface ID

String

Network Segment

Network segment

String

Open Inbound Access (yes/no)

DEPRECATED

Binary/Boolean

Port Group

Asset network port group

List

Ports

Open ports

List

Public Facing (yes/no)

True if the asset is public-facing. If an external port is accessible, set to True.

Binary/Boolean

Route Table ID

Route table ID

String

Security Group ID

Cloud security Group IDs

List

Security Group IP Range

Cloud security group IP ranges permitted

List

Security Group Name

Cloud security group names

List

Security Group Rules

Security group rules

The nested values include:

Security Group Rules::From Port

Security Group Rules::Group Pairs

Security Group Rules::IP Ranges

Security Group Rules::Protocol

Security Group Rules::Rule Name

Security Group Rules::Rule Type

Security Group Rules::To Port

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Services

Services running on the asset

List

Subnet ID

Cloud subnet ID

String

Switch Name

Network switch name

String

VLAN ID

VLAN ID

String

VLAN Name

VLAN name

String

VPC ID

Cloud VPC ID

String

VPN Gateway ID

VPN gateway ID

String

VPN Profile

VPN profile name

String

Others #

Field

Description

Type

Asset Description

Asset description

String

Changed Fields

Specifies a list of fields that have had a change in value.

List

Comments

Comments added

String

Cost Center

Cost center name/ID

String

Idle Instance (yes/no)

True if the asset may be idling

Binary/Boolean

Monthly Cost (US Dollar)

Monthly running costs (in US dollar)

Integer

Organization

Organization name

String

Purpose

Asset’s purpose according to data source

String

User Tickets

User’s service tickets

List

Policy #

Field

Description

Type

Admin Policies

Number of admin policies

Integer

Policy

Policy name

String

Policy Statement

Policy statements

List

User Password Changeable (yes/no)

True if user can change the password

Binary/Boolean

User Password Enabled

User password enabled status

The nested values include:

User Password Enabled::Account

User Password Enabled::Status

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

User Password Expired (yes/no)

True if the user’s password is expired

Binary/Boolean

User Password Min. Length

Minimum length required for user’s password

Integer

User Password Not Required (yes/no)

True if the user’s password is not required

Binary/Boolean

User Password Resettable (yes/no)

True if user’s password is resettable

Binary/Boolean

User Password Reuse Times

Maximum user password reuse times

Integer

User Password Valid Age

Number of days that a user password is valid

Integer

User Password with Lower Letter (yes/no)

True if user’s password must contain lower-case character

Binary/Boolean

User Password with Number (yes/no)

True if user’s password must contain numbers

Binary/Boolean

User Policies

AWS User policies

The nested values include:

User Policies::Account

User Policies::Policies

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Risk #

Field

Description

Type

High Risk Assets

Count of high-risk assets associated with the user

Integer

High Risk Assets List

List of high-risk assets associated with the user

List

High Risk Users

Count of high-risk user associated with the asset

Integer

High Risk Users List

List of high-risk users associated with the asset

List

Risk Factors

All risk factors

List

Risk Level

Risk level

String

Risk Ranking

Standardized/ranked risk score (1-100)

Integer

Risk Score

Raw risk score (higher value, riskier)

Float

Top Factor 1

Risk top factor 1

String

Top Factor 2

Risk top factor 2

String

Top Factor 3

Risk top factor 3

String

Smart Labels #

Field

Description

Type

Smart Labels

A complex query the user has created in Lucidum. For details, see Creating and Managing Smart Labels.

Boolean

Float

Integer

List

String

Tags #

Field

Description

Type

Tags

Tags the user has created in Lucidum and can assign to asset in Lucidum. For details, see Creating and Managing Tags.

List

Number

String

Time

Image Tag

Cloud instance image tags

The nested values include:

Image Tag::Key

Image Tag::Value

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Tag

Tag retrieved by Lucidum from an asset. In Lucidum these are called Ingested Tags.

The nested values include:

Tag::Key

Tag::Value

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Threat #

Field

Description

Type

Critical Threats

Number of critical-severity threats

Integer

Endpoint Agent (yes/no)

True if the endpoint protection agent is installed

Binary/Boolean

High Severity Threat List

List of all high-severity threats

List

High Threats

Number of high-severity threats

Integer

Malware/Threat Alerts

Number of malware infections or threats detected

Integer

Medium Severity Threat List

List of all mediuum-severity threats

List

SANS Malicious IP (yes/no)

Specifies whether an IP address is included in SANS list of malicious IPs

Binary/Boolean

Threat List

Threat list

List

TOR Node IP (yes/no)

Specifies whether an IP address is from the TOR network

Binary/Boolean

User #

Field

Description

Type

# of Users

Number of users linked to the asset

Integer

All Login Users

List of users on the asset.

The nested fields include:

All Login Users::First Ingestion Time

All Login Users::First Time Seen

All Login Users::IP Address

All Login Users::Last Time Seen

All Login Users::Source

All Login Users::Source User

All Login Users::User

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Bucket Permission

Specifies the S3 permissions for a user.

The nested fields include:

Bucket Permission::Owner_Name

Bucket_Permission::Permission

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Department

The business department associated with the user account

String

Duplicated User Detection

Confidence score for potentially duplicated users

Integer

Email

The email associated with the user account

String

Job Title

The job title associated with the user account

String

Lucidum User Name

Lucidum derived user entity name

String

Manager

The manager’s name associated with the user account

String

Person Full Name

The person’s full/display name

String

Related to Asset (yes/no)

True if the user has one or more assets linked

Binary/Boolean

Role Assuming Principals

Cloud role assuming principal(s)

List

Role ID

Role ID

String

Role Name

Role name

List

Source User Name

Data source raw user name

List

System Admin (yes/no)

True if the user has admin permission

Binary/Boolean

User Active (yes/no)

True if the user is active

Binary/Boolean

User Disabled (yes/no)

True if the user account is disabled (in LDAP)

Binary/Boolean

User Group Member

User LDAP full group memberships

List

User Groups

Groups associated with the user

List

User IDs

The user IDs linked to the user account

List

User Key

The API access key(s) associated with the user (AWS) account

The nested values include:

User Key::Account

User Key::Creation Time

User Key::Key ID

User Key::Last Time Used

User Key::Status

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

User LDAP Group Members

User LDAP full group memberships

List

User LDAP Groups

User LDAP CN groups

List

User Locked Out (yes/no)

True if the user is locked out (from LDAP)

Binary/Boolean

User Sources

User linked data source(s)

List

User SSO Failures

Number of failed SSO logins

Integer

User Status

User status

The nested values include:

User Status::Last Time Seen

User Status::Lucidum Status

User Status::Source

User Status::Source User

User Status::Status

User Status::User Disabled

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

User Terminated (yes/no)

True if the user is terminated in HR

Binary/Boolean

User Type

User type

String

Vulnerability #

Field

Description

Type

Critical CVE List

Critical CVE IDs

List

Critical Vulns

Number of critical-severity vulnerabilities

Integer

CVE Count

Number of CVE vulnerabilities

Integer

CVE Description

Description of a vulnerability

String

CVE List

CVE IDs

List

CVE Software

One or more software packages affected by the CVE

Nested values include:

CVE Software::Name

CVE Software::Type

CVE Software::Vendor

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

CVE Solutions

Specifies the solution (if applicable) for a CVE

String

CVE Workarounds

Specifies the workaround (if applicable) for a CVE

String

CVSS Score

Score in the Common vulnerability scoring system. A mathematical/statistical scoring for vulnerabilities. Maintained by FIRST (forum of incident response and security teams). Range is 0 (no risk) – 10 (critical risk).

Float

CVSS Severity

Severity in the Common vulnerability scoring system, maintained by FIRST (forum of incident response and security teams). Possible values are Critical, High, Medium, Low

String

CVSS Version

Version in the Common vulnerability scoring system, maintained by FIRST (forum of incident response and security teams). Each version of CVSS includes improved metrics and formulas. Possible versions v2 (released 2007), v3.0 (2015), v3.1 (2019), and v4.0 (2023).

String

EPSS Percentils

Percentile in the Exploit prediction scoring system. A mathematical/statistical scoring for exploits. Maintained by FIRST (forum of incident response and security teams)

Integer

EPSS Score

Score in the Exploit prediction scoring system. A mathematical/statistical scoring for exploits. Maintained by FIRST (forum of incident response and security teams)

Float

High CVE List

High CVE IDs

List

High EPSS Count

Number of EPSS vulnerabilities

Integer

High EPSS List

List of EPSS vulnerabilities

List

High Vulns

Number of high-severity vulnerabilities

Integer

KEV Count

Number of vulnerabilities from the Known Exploited Vulnerabilities catalog.

Integer

KEV List

List of vulnerabilities from the Known Exploited Vulnerabilities catalog.

List

Known Exploited Vulnerability (yes/no)

Specifies if this is a Known Exploited Vulnerability, as specified by CISA.

Binary/Boolean

Known Fix (yes/no)

Specifies the solution (if applicable) for a CVE

Binary/Boolean

Low Vulns

Number of low-severity vulnerabilities

Integer

Lucidum Verified Risk

Lucidum calculates Lucidum Verified Risk by ingesting CVSS data, KEV data, and EPSS data about a vulnerability and applying proprietary rule-based algorithms and machine learning algorithms. The lowest possible score is “1”. The highest possible score is “100”. The higher the Lucidum Verified Risk score, the greater the risk.

Integer

Medium Vulns

Number of medium-severity vulnerabilities

Integer

Mitigated Vulns

Number of mitigated vulnerabilities

Integer

Vuln Scan (yes/no)

True if the asset is scanned by vulnerability assessment

Binary/Boolean

Vulnerabilities

Vulnerability details

The nested values include:

Vulnerabilities::CVE

Vulnerabilities::CVSS Score

Vulnerabilities::Description

Vulnerabilities::EPSS Percentile

Vulnerabilities::EPSS Score

Vulnerabilities::Fixable

Vulnerabilities::KEV

Vulnerabilities::Lucidum Verified Risk

Nested List (String)

See Using Queries with Nested Lists for details on nested lists.

Vulnerability Names

Vulnerability names

List

Regular Expressions #

For fields of type String, List, and Nested List (String, you can include special characters in the Value field. These fields allow you to further customize the query.

Characters

Description

Example

^ (caret)

Matches entries that start with the character(s) to the right

For example, if the field is Data Category,

^F

matches both “Finance” and “Facility”

, (comma)

Functions as an “OR”, examining all values in the comma-separated list and showing results that match one or more of the values in the list.

For example, if the field is Data Sources:

crowdstrike,carbonblack,sentinelone

matches any asset that has one or more Data Sources from CrowdStrike or CarbonBlack or SentinelOne.

NOTE: Do not include spaces QA after the comma.

$ (dollar sign)

Matches entries that end with the character(s) to the left

For example, if the field is Data Category,

t$

matches

“Customer Support” and “Product”

. (period)

Matches one instance of any character

For example, if the field is Lucidum User Name

..te

matches

“achristensen”,”bhatter”, “kate”, and “pete”

+ (plus sign)

Matches one or more occurrences of the character to the left of the symbol

For example, if the field is Data Description,

Agre+m

matches

“Budget Agreements”

? (question mark)

Matches zero or one occurrence the character to the left of the symbol

For example, if the field is Data Description,

q?

matches

“Budget Requirements”

| (pipe)

An OR. Matches either the string the left or the string on the right of the symbol.

For example, if the field is Data Category,

Fin|Info

Matches both “Finance” and “Information Technology”

What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on January 8, 2026
Using Queries with Nested ListsAppendix: Data Types, Operators, and Regular Expressions
Table of Contents
  • Data Source and Lucidum Data Group
  • Lucidum Data Group
    • Age
    • Applications
    • Asset
    • Cloud
    • Compliance
    • Data
    • Data Source
    • DevOps
    • Extra Fields
    • Hardware
    • Life Cycle
    • Location
    • Lucidum
    • Network
    • Others
    • Policy
    • Risk
    • Smart Labels
    • Tags
    • Threat
    • User
    • Vulnerability
  • Regular Expressions

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube

@ 2025 Lucidum, Inc. Design By Sandman Studios