Introduction #
Lucidum allows you to easily view details about assets, users, and vulnerabilities in your environment.
Lucidum allows you to view:
-
a table of all assets in your environment:
-
a table of all users in your environment:
-
a table of all vulnerabilities in your environment:
-
details about each asset, including raw data and enriched data
-
details about each user, including raw data and enriched data
-
details about each vulnerability, including raw data and enriched data
-
details about the data from each Lucidum Connector (data source)
This document describes how to find and view all these types of data.
Connectors #
Lucidum connectors provide the data to your lucidum system.
Connectors allow Lucidum to ingest data from your environment and discover, identify, and classify assets, data, and users. Lucidum includes pre-built connectors for the most commonly used solutions for security, vulnerability scanning, cloud, data warehouse, identity management, logs, network, endpoint management, IP management, file sharing, and devops.
To configure a connector, you provide credentials that allow Lucidum secure, read-only access to a deployed solution.
The more connectors you configure, the better your data set.
Best Practices #
To uncover all information in your environment, Lucidum recommends you configure Lucidum connectors for all of the solutions that you use. For example:
-
The directory solutions in your environment (for example, Azure AD, Microsoft AD, Jump Cloud, PingOne, OpenLDAP,)
-
The cloud solutions in your environment (for example, AWS, Azure, Google Cloud, Oracle Cloud)
-
The SSO solutions and identify and access management (IAM) solutions in your environment (for example, Okta, AWS IAM, PingOne, OneLogic, SecurAuth)
-
The DHCP solutions in your environment (For example, Infoblox, Efficient IP, BlueCat)
-
The Mobile Device Management solutions in your environment (for example, Addigy, Citrix Endpoint, Jamf Pro, Kandji)
-
The VPN solutions in your environment (For example, Cisco AnyConnect, FortiClient, Palo Alto VPN, Citrix Gateway, Zscaler Private Access)
-
The Endpoint Management solutions in your environment (for example, Jamf, Intune, Citrix Endpoint Management, Symantec Endpoint Management, Hexnode)
-
The Endpoint Protection solutions in your environment (for example, Microsoft Defender for Endpoint, Trellix Endpoint Security, Symantec Endpoint Protection, SentinelOne, Crowdstrike Falcon)
-
The Endpoint Detection and Response solutions in your environment (for example, SentinelOne, Falcon Crowdstrike, Trend Micro XDR, Check Point Harmony Endpoint, Cortex XDR)
-
The cloud security solutions in your environment for cloud assets (for example, Netskope, Illumio Core, Orca, Trend Micro Cloud One, Sophos Central)
-
The anti-virus solutions or vulnerability management solutions in your environment (for example, Burp Suite, Cycognito, Greenbone, Kenna, Microsoft Defender, Qualys, Rapid7, Tenable, Vulcan)
-
The SIEM solutions in your environment (for example, Splunk, Trellix, Exabeam, QRadar, Microsoft Sentinel)