Skip to content
Login

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Videos
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Protected: Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using Queries with Nested Lists
  • Protected: Appendix: Fields in the Lucidum Data Group
  • Appendix: Data Types, Operators, and Regular Expressions

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Protected: Introduction to Tags and Smart Labels
  • Protected: Overview of Tags
  • Protected: Migrating Custom Fields to Tags
  • Protected: Creating and Managing Tags
  • Protected: Overview of SmartLabels
  • Protected: Migrating Dynamic Fields to SmartLabels
  • Protected: Creating and Managing SmartLabels
  • Protected: Using Functions in SmartLabels
  • Protected: Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Protected: Overview of Value-Oriented SmartLabels
  • Protected: Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Protected: Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Protected: Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Protected: Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Protected: Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • Data Scheduler
  • License Settings
  • Notifications
  • System Preferences
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Introduction to Lucidum MoM
  • Adding Lucidum Systems (Deployments) to MoM
  • Protected: Adding Users to MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Dashboards
  • Creating a Chart

Creating a Chart

Estimated Reading Time: 28 min read

Introduction to Charts #

Lucidum includes the following types of charts:

  • Bar
  • Big Number
  • Histogram.
  • Line
  • Nested Pie
  • Pie
  • Ring Gauge
  • Stacked Bar
  • Table
  • Text

When creating a new chart, there are:

  • generic steps that apply to all charts

  • chart-specific steps

This chapter describes how to create each type of chart.

Best Practices #

The Asset History table is the largest database table in Lucidum. To maximize performance, Lucidum recommends that you follow these best practices when creating charts:

  • To view the historical vulnerability data about assets, use the Vulnerability History table instead of the Asset History.

    • For example, you can query the Vulnerability History table for a list of all CVEs (CVE List exists) and then include Lucidum Asset Name as one of the parameters in the chart.

  • If you use the Asset History table in a chart, note that the Lucidum fields (Lucidum Asset Name, Lucidum Asset Type, Lucidum OS Category, Lucidum OS Version, Lucidum Status, Lucidum User Name, Lucidum Vendor) are indexed and provide better performance than fields in Data Source Details.

  • If you use the Asset History table in a chart, limit the scope to only the range of data you need. For example, if you require only 90 days of data, specify that in the query, using the fields in the Age category.

Working Examples #

To view real-world examples of dashboards and charts that you can copy and edit, see the Value-Oriented Dashboards included with your Lucidum system.

Creating a Chart: Generic Steps #

To add a new chart to a dashboard:

  1. Log in to your Lucidum system.

  2. In the left menu, click Dashboards.

  3. In the Channel pane, click the channel where the dashboard lives.

  4. In the right pane, find the dashboard you want to edit. Click the dashboard name.

  5. Lucidum loads the dashboard.

  6. In the dashboard, click the Add Chart (plus-sign) button.

  7. The Add Chart page appears:

    dashboards_add_chart_updated.png

  8. In the Add Chart page, choose a chart type. Choices are:

    • Bar. A bar chart, typically with a count value on the y-axis and a measurement or category on the x-axis.

    • Big Number. Displays a single count value. Note that the Big Number chart type is available only for data sets that are count only. For data sets that are not count only, the Big Number chart type is disabled.

    • Histogram. Uses bars to represent the distribution of values. The y-axis measures a count value, and the x-axis includes intervals (ranges of data) called bins. Note that the Histogram chart type is available only for data sets that include a numeric range on the x-axis.

    • Line. A chart shows a count value on the y-axis and a measurement (usually time) on the x-axis.

    • Nested Pie. A nested pie chart shows two types of related values. The color coding shows which values are related. For example, a nest pie chart could have an inner circle with general types of operating systems (Linux, Mac, Windows) for a group of assets. The outer circle could include versions of operating systems for the same group of assets. The color coding shows which versions go with which general type of operating system. If Windows was green, Windows Server 2019 and Windows Server 2022 would also be green.

    • Pie. A chart that shows proportions. Each slice represents a category; the “pie” represents the entire population.

    • Ring Gauge. A ring gauge chart displays up to four nested field values on a circular gauge. These charts work best for a field value that can returns values like “critical, high, medium, low”. For details on enabling this chart type, see the section on Gauge.

    • Stacked Bar. A stacked bar chart, typically with a count value on the y-axis and a measurement or category on the x-axis. Each category on the x-axis includes color-coded sub-categories. For example, you create a bar chart that shows number of assets per location. For each location, the bar could include color-coded sub-categories that map to the type of operating system.

    • Table. Data sorted by rows (one per instance) and columns (values that describe each instance).

    • Text. A block of text to include in the dashboard.

  9. After selecting a chart type, enter values in the following fields:

    • Title. Title of the chart.

    • Subtitle. Second title for the chart.

  10. Select values for the the following fields:

    • Type of Data. This field determines the type of base query that will populate the chart. Choices are:

      • Asset. Retrieve information about assets.

      • Asset-IP Mapping. Lucidum uses proprietary machine-learning algorithms to align each asset with an IP address. You can retrieve information about these asset/IP pairs.

      • User. Retrieve information about users.

      • User-IP Mapping. Lucidum uses proprietary machine-learning algorithms to align each user with an IP address. You can retrieve information about these user/IP pairs.

      • Vulnerability. Retrieve information about vulnerabilities.

    • Time Range. This field determines whether the base query that populates the chart will use current data or historical data. Choices are:

      • Current. The default value is from the present day to 7 days old.

      NOTE: To optimize performance, the default time range is Current. If you need to access historical data, contact Lucidum Custom Success for help on using historical data without affecting performance.
    • Configure Filters. Clicking this button leads to the Refine Scope modal, where you can build the base query that will populate the chart. For details on building queries, see the chapter on Building Queries.

  11. The remaining fields differ depending on the type of chart you choose.

Creating a New Chart with Save As #

Lucidum allows you to edit an existing chart and save the edited chart as a new chart.

To create a new chart with the Save As feature:

  1. Log in to your Lucidum system.

  2. In the left menu, click Dashboards.

  3. In the Channel pane, click the channel where the dashboard lives.

  4. In the right pane, find the dashboard you want to edit. Click the dashboard name.

  5. Lucidum loads the dashboard.

  6. In the dashboard, click the Edit This Dashboard (pencil) button.

  7. Note that now each chart includes a set of icons to the right of the chart name:

    dashboard_example5.png

  8. Find the chart you want to Save As. Click its Settings (pencil) icon. The Edit Chart page appears.

  9. In the Edit Chart page, you can edit any of the fields for the chart, including the query.

  10. For details on creating and editing queries, see the chapter on Building Queries.
  11. Provide a new value in the Title field.

  12. To save you changes as a new chart, enter a new value in the click the Preview (eye) icon and then click the Save As (disc with pencil) icon.The new chart appears in your current dashboard.

Creating a Bar Chart #

A bar chart typically includes a count value on the y-axis and a measurement or category on the x-axis.

  1. After selecting Bar as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    bar_chart_22.0.png

  2. Supply values in the following fields:

    • Category. For bar charts, this is the value in the x-axis. Choose a value for which you want a count. For example, if you select “Lucidum Asset Name”, the x-axis will display a count of assets for the attribute in the Series. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

    • Series. The attribute that you want to display on the y-axis. For example, if you select “OS and Version”, the bar chart will display the number of assets for each OS and version. You can select any field that is returned by the base query in the Configure Filters field.

    • Sort By. Specify how to sort the bar chart. Your choices are by the value of Category or the value of Series. You can use the arrow to the right to specify ascending or descending.

  3. Click the eye-icon to view a preview of the chart.

    bar_chart_gear_22.0.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the bar chart.

    • Number of Series Labels. Number of bars on the x-axis. Values can be from 1-100.

    • Rename Data Labels. By default, the x-axis labels are assigned values from the ingested values. If you would like to rename a label:

      • In the field on the left, select from the list of label names in the chart.

      • In the field on the right, enter the new label name.

    • Numeric Format. See descriptions of the possible values in the Numeric Format section.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Using a Bar Chart to Create a Time-Series #

You can use the fields in the Age category to create a time series with a bar chart.

For example, you could create a bar chart that displays the number of new users, by date:

bar_chart_time_series_22.0_1.png

To create this chart, we specified the following:

bar_chart_time_series_22.0.png

  1. We created a bar chart.

  2. We searched the user database for all Lucidum User Names.

  3. The Category (y axis) is the number of Lucidum User Names.

  4. The Series (x axis) specifies the date the user was first seen.

  5. The Group Series By field specifies Day. This means that we want to see the number of users for each day.

  6. The Sort By field specifies that we want to order the value by First Time Seen, from most recent to least recent.

Creating a Big Number Chart #

A big number chart displays a count with a number as the only element in the chart.

  1. After selecting Big Number as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    big_number1_14.0.png

  2. Supply values in the following fields:

    • Category. For big number charts, this is the attribute that will be displayed in the chart. Choose a value for which you want a count. You can select any field that is returned by the base query in the Configure Filters field. For example, if you select “Lucidum Asset Name”, chart will display a count of assets.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

  3. Click the eye-icon to format the chart and view a preview of the chart.

    big_number2_14.0.png

  4. You can use the editor pane above the number to edit:

    • Choose a font for the number

    • Choose a style for the number

    • Choose a font size for the number

    • Choose formatting for the number

    • Choose a color and highlight for the number

  5. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Numeric Format. See descriptions of the possible values in the Numeric Format section.

  6. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Histogram Chart #

Histogram charts use bars to represent the distribution of values. The y-axis measures a count value, and the x-axis includes intervals (ranges of data) called bins. Note that the Histogram chart is available only for data sets that include a numeric range on the x-axis.

  1. After selecting Histogram as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    histogram3.png

  2. Supply values in the following fields:

    • Category. For histogram charts, this is the value in the y-axis. Choose a value for which you want a count. For example, if you select “Lucidum Asset Name”, the y-axis will display a count of assets for the attribute in the Series. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

    • Series. The attribute that you want to display on the x-axis. This must be a field with a numeric value. You can select numeric field that is returned by the base query in the Configure Filters field.

    • Sort By. Specify how to sort the bar chart. Your choices are by the value of Category or the value of Series. You can use the arrow to the right to specify ascending or descending.

  3. Click the eye-icon to view a preview of the chart.

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    histogram3.png

    • Number of Bins. The number of intervals (ranges of data) that will appear on the x-axis. The intervals are represented as bars, like a bar chart.

    • Min. Lowest number on the x-axis.

    • Max.Highest number of the x-axis.

    • Category Title. Label for the x-axis.

    • Series Title. Label for the y-axis.

    • Numeric Format. See descriptions of the possible values in the Numeric Format section.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Line Chart #

Line charts are usually used for time-series data, with a count value on the y-axis and a measurement (usually time) on the x-axis.

  1. After selecting Line as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    line_chart.png

  2. Supply values in the following fields:

    • Category. For line charts, this is the value in the y-axis. Choose a value for which you want a count. For example, if you select “Lucidum Asset Name”, the y-axis will display a count of assets for the attribute in the Series. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

    • Series. The attribute that you want to display on the x-axis. This is a numeric value or frequently a date. For example, if you select “First Time Seen”, the bar chart will display the number of assets seen each day. You can select any field that is returned by the base query in the Configure Filters field.

    • Group Series By. If you select a date value for the x-axis, you can choose to group data in the y-axis by day, week, month, or year.

    • Sort By. Specify how to sort the bar chart. Your choices are by the value of Category or the value of Series. You can use the arrow to the right to specify ascending or descending.

  3. Click the eye-icon to view a preview of the chart.

    line_chart2.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Category Title. Title for the y-axis

    • Series Title. Title for the x-axis

    • Number of Series Labels. Number of labels on the x-axis. Values can be from 1-100.

    • Rename Data Labels. By default, the x-axis labels are assigned values from the ingested values. If you would like to rename a label:

      • In the field on the left, select from the list of label names in the chart.

      • In the field on the right, enter the new label name.

    • Numeric Format. See descriptions of the possible values in the Numeric Format section.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Nested Pie Chart #

A nested pie chart shows two types of related values. The alignment shows which values are related. For example, a nest pie chart could have an inner circle with general types of operating systems (Linux, Mac, Windows) for a group of assets. The outer circle could include versions of operating systems for the same group of assets. The alignment shows which versions are Linux versions, which versions are Mac versions, and which versions are Windows versions.

  1. After selecting Nested Pie as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    nested_pie1.png

  2. Supply values in the following fields:

    • Categories. Specify two attributes. The default value is “Lucidum Asset Name”. For nested pie charts, these two attributes are displayed in the chart. The first field specified in Categories appears in the outside ring. The second field specified appears in the inside ring. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

  3. Click the eye-icon to view a preview of the chart.

    nested_pie2.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Number of Rows. Specify the number of query results to include in the chart.

    • Show Label. Include a label on each slice of the pie.

    • Show Legend. Include a color-coded legend for the pie.

    • Rename Data Labels. By default, the x-axis labels are assigned values from the ingested values. If you would like to rename a label:

      • In the field on the left, select from the list of label names in the chart.

      • In the field on the right, enter the new label name.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Pie Chart #

A pie chart displays the sub-components that make up a category. For example, a pie could represent all assets, and each slice could represent the type of assets (VMs, servers, workstations).

  1. After selecting Pie as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    pie1.png

  2. Supply values in the following fields:

    • Category. For pie charts, this is the value represented by the entire pie. Choose a value for which you want a count. For example, if you select “Lucidum User Name”, the pie represents all the users in Lucidum. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

    • Series. The attribute that you want to apply to the members of the pie to create slices. For example, if you select “Department”, the pie chart will divide the number of user by department. You can select any field that is returned by the base query in the Configure Filters field.

    • Sort By. Specify how to sort the chart. Your choices are by the value of Category or the value of Series. You can use the arrow to the right to specify ascending or descending.

  3. Click the eye-icon to view a preview of the chart.

    pie2.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Number of Rows. Specify the number of query results to include in the chart.

    • Show Label. Include a label on each slice of the pie.

    • Show Legend. Include a color-coded legend for the pie.

    • Rename Data Labels. By default, the x-axis labels are assigned values from the ingested values. If you would like to rename a label:

      • In the field on the left, select from the list of label names in the chart.

      • In the field on the right, enter the new label name.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Ring Gauge Chart #

A ring gauge chart displays up to four nested field values on a circular gauge. These charts work best for fields that return values like “critical, high, medium, low”.

  1. After selecting Gauge as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    gauge1.png

  2. Supply values in the following fields:

    • Category. For gauge charts, this is the value represented by the entire gauge. Choose a value for which you want to monitor values. For example, if you select “Lucidum Asset Name”, the gauge represents all the assets in Lucidum. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. If you choose a numeric value in the Category field, the sigma field appears. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values

    • Series. The attribute that you want to apply to the gauge. For example, if you select “Risk Level”, the gauge chart will display the number of assets at each risk level. You can select any field that is returned by the base query in the Configure Filters field.

    • Sort By. Specify how to sort the chart. Your choices are by the value of Category or the value of Series. You can use the arrow to the right to specify ascending or descending.

  3. Click the eye-icon to view a preview of the chart.

    gauge2.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Number of Rows. Specify the number of query results to include in the chart.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Creating a Stacked Bar Chart #

A stacked bar chart is a bar chart, typically with a count value on the y-axis and a measurement or category on the x-axis. Each category on the x-axis includes color-coded sub-categories. For example, you could create a stacked bar chart that shows the number of assets per location. For each location, the bar could include color-coded sub-categories that map to the type of operating system.

  1. After selecting Stacked Bar as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    stacked_bar1.png

  2. Supply values in the following fields:

    • Categories. Specify two attributes. For stacked bar charts, these two attributes are displayed in each bar. The first field specified in Categories appears as the main bar. The second field uses color-coding to show the contents of each bar. You can select any field that is returned by the base query in the Configure Filters field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

  3. Click the eye-icon to view a preview of the chart.

    stacked_bar2.png

  4. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Category Title. Title for the y-axis.

    • Series Title. Title for the x-axis

    • Rename Data Labels. By default, the x-axis labels are assigned values from the ingested values. If you would like to rename a label:

      • In the field on the left, select from the list of label names in the chart.

      • In the field on the right, enter the new label name.

    • Number of Rows. This field increases the range of the y-axis and therefore increase the maximum number of assets per bar.

  5. Click Save (disc icon) in the lower right corner to save the chart.

Using a Stacked Bar Chart to Create a Time-Series #

You can use the fields in the Age category to create a time series with a bar chart.

For example, you could create a bar chart that displays the number of new users, by date:

barchart_time_series.png

To create this chart, we specified the following:

barchart_time_series2.png

  1. We created a bar chart.

  2. We searched the user database for all Lucidum User Names.

  3. The Category (y axis) is the number of Lucidum User Names.

  4. The Series (x axis) specifies the date the user was first seen.

  5. The Group Series By field specifies Day. This means that we want to see the number of users for each day.

  6. The Sort By field specifies that we want to order the value by First Time Seen, from most recent to least recent.

Creating a Table Chart #

Table charts display a matrix, where each row represents an instance and the columns are values that describe each instance.

  1. After selecting Table as a chart type and providing values for Title, Subtitle, Type of Data, Time Range, and Configure Filters, you must enter values in the remaining fields.

    table1_14.0.png

  2. Supply values in the following fields:

    • Categories. Select a field. This field will be the column value. You can select any field that is returned by the base query in the Configure Filters field. To create multiple columns in the table, select multiple values in the Category field. You can drag-and-drop to re-arrange the order of the fields. The columns will appear in the order specified in this field.

      • For Assets, the default value is Lucidum Asset Name, but you can edit this value.

      • For Users, the default value is Lucidum User name, but you can edit this value.

      • For Vulnerabilities, the default value is CVE List, but you can edit this value.

      • For Asset-IP Mapping, the default value is IP Address, but you can edit this value.

      • For User-IP Mapping, the default value is IP Address, but you can edit this value.

    • Sigma. In this field, you can specify whether you want to display Average Value, Count, Minimum Value, Maximum Value, or Sum of Values for the Category field.

    • Series. Select a field. Each row in the table will be an instance of this field. You can select any field that is returned by the base query in the Configure Filters field.

    • Sort By. Specify a table column to sort the table. When you save the chart, the sort is saved. NOTE: You can sort by fields that are not included in the Category field.
  3. Click the eye-icon to view a preview of the chart.

    table2_14.0.png

  4. You can adjust the column width by dragging the bars to the right of each column. When you save the chart, the column widths are saved.
  5. If you click the gear icon in the lower right corner, you can apply additional settings to the chart.

    • Numeric Format. See descriptions of the possible values in the Numeric Format section.

    • Rename Column Headers. Click the plus-sign icon to rename column headings.

      • Current. Select from the current column names, which use the database field name.
      • New. Manually assign a new name to the column.

    • Click Save (disc icon) in the lower right corner to save the chart.

Creating a Text Chart #

Text charts display text in a dashboard. You can use these charts to organize information or explain details about a dashboard.

To create a Text chart:

  1. After selecting Text as a chart type , you can enter text in the text editor.

    text1_14.0.png

  2. After entering text, you can use the editor toolbar to:

    • Choose a font for the text.

    • Choose a style for the text

    • Choose a font size for the text

    • Choose font formatting for the text

    • Assign a color to the text

    • Assign a link to the text

    • Format lists

    • Format as block quote

    • Format as code block

    • Insert a horizontal line

    • Insert a table
  3. Click the eye-icon to view a preview of the chart.

  4. Click Save (disc icon) in the lower right corner to save the chart.

Numeric Format #

In the Numeric Format field, you can select from the following numeric types:

  • int. Positive numeric value (no decimal point).

  • int signed. Positive or negative numeric value (no decimal point)

  • float 1 point. Positive numeric value with 1 place after the decimal

  • float 2 point. Positive numeric value with 2 places after the decimal

  • float 3 point. Positive numeric value with 3 places after the decimal

  • Dollar. Dollar value with two places after the decimal

  • dollar_sign. Positive or negative dollar value with two places after the decimal

  • dollar_round value. Dollar value with no decimal point

  • dollar_round_sign. Positive or negative dollar value with no decimal point

  • float signed 1 point. Positive or negative numeric value with 1 place after the decimal

  • float signed 2 point. Positive or negative numeric value with 2 places after the decimal

  • float signed 3 point. Positive or negative numeric value with 3 places after the decimal

  • percent 1 point. Positive percent value with 1 place after the decimal

  • percent 2 point. Positive percent value with 2 places after the decimal

  • percent 3 point. Positive percent value with 3 places after the decimal

  • percent signed 1 point. Negative or positive percent value with 1 place after the decimal

  • percent signed 2 point. Negative or positive percent value with 2 places after the decimal

  • percent signed 3 point. Negative or positive percent value with 3 places after the decimal

  • SI 1 DIGIT. International system of units. For details, see https://mathworld.wolfram.com/SIPrefixes.html. Values will be displayed with no decimal point. For example, 8,288 would be displayed at 8K.

  • SI 2 DIGIT. International system of units. For details, see https://mathworld.wolfram.com/SIPrefixes.html. Values will be displayed with one place after the decimal point. For example, 8,288 would be displayed at 8.3K.

  • SI 3 DIGIT. International system of units. For details, see https://mathworld.wolfram.com/SIPrefixes.html. Values will be displayed with two places after the decimal point. For example, 8,288 would be displayed at 8.28K.

What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on November 6, 2025
Creating a Dashboard
Table of Contents
  • Introduction to Charts
  • Best Practices
  • Working Examples
  • Creating a Chart: Generic Steps
  • Creating a New Chart with Save As
  • Creating a Bar Chart
    • Using a Bar Chart to Create a Time-Series
  • Creating a Big Number Chart
  • Creating a Histogram Chart
  • Creating a Line Chart
  • Creating a Nested Pie Chart
  • Creating a Pie Chart
  • Creating a Ring Gauge Chart
  • Creating a Stacked Bar Chart
    • Using a Stacked Bar Chart to Create a Time-Series
  • Creating a Table Chart
  • Creating a Text Chart
  • Numeric Format

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube X-twitter Facebook

@ 2025 Lucidum, Inc. Design By Sandman Studios

SOLUTIONS

COMPANY

RESOURCES

Solutions

  • Modernize Sec Ops
  • Risk & Vulnerability
  • Data Management
  • CISO Tool Kit

COMPANY

  • About Us
  • Testimonials
  • Patents

Resource Library

  • Documentation
  • E-Books
  • White Papers
  • Videos
  • Blogs