Skip to content
Login

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Videos
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Oasis Security
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Acquia Cloud Platform
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • Crowd IDP
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberArk Privileged Access Manager (PAM) and CyberArk Privilege Cloud
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Oasis Security
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • ThreatQ
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Protected: Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using MetaBlocks with Saved Queries
  • Using Queries with Nested Lists
  • Protected: Appendix: Fields in the Lucidum Data Group
  • Appendix: Data Types, Operators, and Regular Expressions

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Using MetaBlocks with Dashboards
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Protected: Introduction to Tags and Smart Labels
  • Protected: Overview of Tags
  • Protected: Migrating Custom Fields to Tags
  • Protected: Creating and Managing Tags
  • Protected: Overview of SmartLabels
  • Protected: Migrating Dynamic Fields to SmartLabels
  • Protected: Creating and Managing SmartLabels
  • Protected: Using Functions in SmartLabels
  • Using MetaBlocks with SmartLabels
  • Protected: Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Protected: Overview of Value-Oriented SmartLabels
  • Protected: Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks
  • Example MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Protected: Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Protected: Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Protected: Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Protected: Endpoints for SmartLabels
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Protected: Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • API Token Management
  • Data Scheduler
  • License Settings
  • Notifications
  • System Preferences
  • System Settings
  • Theme Management

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Actions
  • Overview of Actions and Actions Workflows

Overview of Actions and Actions Workflows

Estimated Reading Time: 11 min read

What Are Actions? #

Lucidum includes a feature called Actions. Actions are automations that are triggered by query results.

Actions include sending email messages, posting a message to slack, creating tickets, isolating infected devices, or making changes to Active Directory, among other options.

For example, you can define an action that sends an email to the IT team if Lucidum discovers one or more assets without endpoint protection.

Lucidum also includes a type of action for webhooks. For details on webhooks, see the manual Running Headless with Webhooks.

Structure of Actions #

Actions include two pieces

  • A configuration that provides the connection and authorization information to communicate with the external solution.

  • An action that specifies the task to execute, the data to include in the action, and how frequently to execute the action.

Viewing the Actions page #

The Actions page lists all the Action integrations and displays information about the configured actions.

actions_new_ui_numbers.png

  1. Errors pane. If an action type has at least one enabled configuration and one or more actions with an error, the action type appears in the Errors.
  2. Red icon that displays the number of actions that are enabled and have errors.
  3. Disabled pane. If an action type has one at least one enabled configuration, all actions are disabled, and no actions with errors, the action type appears in the Disabled
  4. Gray icon that displays the number of actions that are disabled.
  5. Enabled pane. If an action type has at least one enabled configuration, one enabled action, and no actions have errors, the connector appears in the Enabled
  6. Green icon that displays the number of actions that are enabled and do not have errors.
  7. Available pane. These action types do not have a configuration.
  8. Filter Actions by Category. View action types by category, like Asset Management, Identity Access Management, Risk Management..
  9. Search. Search for action types by name.

Viewing the Configured Actions page #

The Configure Actions page displays information about configured actions for an integration.

actions_configured_actions_callouts_edited_20.0.png

  1. Name and Description of the action.
  2. Page Click this icon to view documentation about the action type. The documentation appears on a new page.
  3. Plus-sign icon. Add a new action.
  4. Menu icon. Opens the menu of options for the action.
  5. Expanded Menu. Includes the following options:
    • Assign MetaBlocks. Assign the action to a MetaBlock. For details, see Adding Actions to MetaBlocks.
    • Clone. Create a copy of the action.
    • Delete. Delete the action.
    • Edit. Edit the action
    • Send Now. Executes the action immediately.
    • View Results. View the action results.
  6. Calendar icon. Action executes after ingestion.
  7. Two arrows Recurring action that executes on a schedule.
  8. 1X icon. Actions executes once, upon saving. To create this type of action, see Alternative Workflow for Creating an Action.
  9. Red toggle icon. Action is enabled and has errors.
  10. Green toggle icon. Action is enabled and does not have errors.
  11. Gray toggle icon. Action is disabled.
  12. Orange toggle icon. Action is currently running.
  13. Red Last Run Time. Action had errors during last run.
  14. Green Last Run Time. Action executed successfully during last run.
  15. Blue Next Run Time. Action is scheduled to run in the future.
  16. Orange Last Run Time. Action is currently running.
  17. Configuration. Displays the Manage Action Configuration page, where you can view, edit and create Configurations for each Action. A Configuration provides the connection and authorization information to communicate with the external solution.
    • For general steps to create a Configuration, see Workflows for Creating Configurations and Action in Lucidum.
    • For details about creating a Configuration for a specific type of action, see the documentation for the action. For example, to create a Dynatrace Configuration, see the documentation on Dynatrace Actions.
  18. Tokens. Displays the Manage Action Tokens page, where you can view the list of Action Token and create new Action Tokens. Action Tokens allow a Lucidum account to access the /CMDB/v2/data/ldg endpoint and make API requests to that endpoint. For details, see Generating a Bearer Token for /CMDB/v2/data/ldg Endpoint.

List of Actions #

To find an action, search the alphabetical list of third-party vendors. See the section Viewing the Actions page.

The published list of Actions is a living document. Lucidum releases new Actions according to customer needs.

The current list of Actions reflects all the Actions currently in production at customer sites. If you need an Action that does not appear on the list, please contact your Lucidum Account Representative.

Workflow for Creating Configurations and Actions in Lucidum #

Create a New Configuration #

To create a new configuration:

  1. Choose Actions from the left pane.
  2. In the Actions page, click on an icon in the right pane.
  3. To create a configuration for the action, click the Configuration (gear) icon in the upper left. A configuration provides the connection and authorization information to communicate with the external solution.
  4. the Manage Action Configurations page appears.

    actions_manage_action_configurations_25.0.png

  5. In the Manage Action Configurations page, you can either click the Add Configuration icon (plus sign) or edit the Default configuration by clicking the Edit icon (pencil).
  6. In the Manage Action Configurations page, supply values in the fields. The fields vary by Action type.
  7. Save the configuration.
  8. Click the Configuration (gear) icon.
  9. In the Manage Action Configurations page, find your new configuration. Click its Test Configuration icon (page with checkmark) to test authentication and the connection.

Create a New Action #

To create a new action:

  1. Choose Actions from the left pane.
  2. In the Actions page, click an icon for the third-party vendo in the right pane.
  3. To create an action, click the Create New Action (+) icon in the Configure Actions pane. An action specifies the task to execute, the data to include in the action, and how frequently to execute the action.
  4. Lucidum displays the Add a New Action page.

  5. Provide values in each page and click the Next (>) icon.
  6. Save the action.
  7. Lucidum uses the Luci LLM to automatically populate the Description field and the Business Value field. You cannot edit the values in these fields.
  8. Lucidum automatically sets the action to Enabled. You can disable the action using the enable/disable toggle in the Configured Actions pane.
  9. Lucidum automatically tests the action when you save it and automatically executes the action at the time and recurrence you defined in the action.

NOTE: You can apply an existing configuration to more than one action. If a configuration already exists, you might be able to re-use the existing configuration and might not need to create a new one.

Workflow Using Clone to Create a New Action #

To create a new action using the Clone feature:

  1. Choose Actions from the left pane.
  2. In the Actions page, choose from the action types in the Categories pane or click on an icon in the right pane.
  3. To clone an action, in the Configured Actions pane, find the action you want to clone. Click the Menu icon. Choose Clone.

    actions_configured_actions_clone_25.0.png

  4. Lucidum displays the Clone Action page.
  5. Provide a new name in the Action Name field.
  6. Edit one or more values in one or more pages and click the Next (>) icon.
  7. Save the action.
    NOTE: Save is not enabled until you provide a new name for the action.
  8. Lucidum automatically sets the action to Enabled. You can disable the action using the enable/disable toggle in the Configured Actions pane.
  9. Lucidum automatically tests the action when you save it and automatically executes the action at the time and recurrence you defined in the action.

NOTE: You can apply an existing configuration to more than one action. If a configuration already exists, you might be able to re-use the existing configuration and might not need to create a new one.

Alternative Workflow for Creating an Action #

You can also create an action when viewing the results of a query. To do this:

  1. Create a query from the Query button. For details, see the chapter on Creating Queries.
  2. Click the Show Results (checklist) icon to open the Query Result page
  3. The Query Results page displays a the results of query.

    actions_alternative_create_action_25.0.png

  4. In the Query Results page, click the checkboxes for records you want to include in the action.
  5. In the Query Results page, click the Create a recurring action (arrows) icon or the Create a one-time action (1x) icon.
  6. In the Send to Actions page, select an action type.

    query_to_action_updated.png

  7. Lucidum displays the Create a New Action page, with the query already loaded in the Filters page.

    query_to_action2_updated.png

  8. Follow the steps in the section on Creating an Action. You can skip the steps about defining Filters, because the filter is now populated.

Workflow for Editing a Configuration #

To edit an existing configuration , follow these steps:

  1. Choose Actions from the left pane.
  2. In the Actions page, click an icon in the right pane.
  3. To create a configuration for the action, click the Configuration (gear) icon in the upper left. A configuration provides the connection and authorization information to communicate with the external solution.
  4. In the Manage Action Configurations page, find the configuration you want to edit and click its Edit (pencil) icon.

    manage_action_configurations_edit.png

  5. You can edit one or more fields in the configuration.
  6. Click Save to save your changes.

Workflow for Editing an Action #

To edit an existing actions, follow these steps:

  1. Choose Actions from the left pane.
  2. In the Actions page, choose from the action types in the Categories pane or click on an icon in the right pane.
  3. In the Configured Actions pane, find the action profile you want to edit. Click its Menu icon. Choose Edit (pencil).

    actions_configured_actions_edit_25.0.png

  4. You can edit fields in the General page, the Filters page, the Schedule page, or the Details page.
  5. Click the Save Profile (disc) icon to save your changes.

Workflow for Creating an Action Token #

In the Lucidum API, the /CMDB/v2/data/ldg endpoint retrieves only enriched data from the Lucidum Data Group. This endpoint provides a more focused set of results for each asset or user.

To authenticate with the /CMDB/v2/data/ldg endpoint, you must use an action bearer token. This bearer token allows a Lucidum account to access the /CMDB/v2/data/ldg endpoint.

NOTE: For all other API endpoints, you must generate a standard bearer token associated with your Lucidum user account. The action bearer token is used only with the the /CMDB/v2/data/ldg endpoint.

generate_action_token2.png

For details on creating an Action Token, see Generating a Bearer Token for /CMDB/v2/data/ldg Endpoint.

Viewing Status of an Existing Action and Executing an Action On-Demand #

To view information about an existing action:

  1. Choose Actions from the left pane.
  2. In the Actions page, click an icon in the right pane.
  3. The Configured Actions pane displays information about the status of each action and provides options to execute the action on-demand:

    actions_configured_actions_status_callouts_25.0.png

  1. Red toggle icon. Action is enabled and has errors.
  2. Green toggle icon. Action is enabled and does not have errors.
  3. Gray toggle icon. Action is disabled.
  4. Orange toggle icon. Action is currently executing.
  5. Red Last Run Time. Action had errors during last run.
  6. Green Last Run Time. Action executed successfully during last run.
  7. Blue Next Run Time. Action is scheduled to run in the future.
  8. Orange Last Run Time. Action is currently executing.
  9. Menu icon. Opens the menu of options for the action.
  10. Airplane icon. Executes the action on-demand (now).

Action Results #

You can view general logs and detailed logs about each Lucidum actions.

To view these logs:

  1. Choose Actions from the left pane.
  2. In the Actions page, click an icon in the right pane.
  3. In the Configured Actions pane, select the Menu icon. Choose View Results.
  4. The Action Results modal page appears:

    action_results1.png

  5. The Action Results modal displays:
    • Status. Specifies whether the last execution of the action was successful (green) or failed (red).
    • Triggered At. The date and time the action was last triggered.
    • Number of Records. Number of records included in the action.
    • Actions. Download the log file for the last execution of the action.
  6. To download a detailed log file for an execution of the action, click on the Preview Records (eye) icon in the Actions column.
  7. Choose either Preview as CSV or Preview as JSON.
  8. After viewing the file, click the Download (down arrow) icon.
  9. Lucidum downloads a .csv or .json file to your local computer. The  file includes the payload for the action. You specify this payload in the Output Fields field of the action.
  10. An example log file looks like this:

    csv_log_download.png

    • This action found nine assets that match the Filter in the Filters page.
    • For each of those assets, the action sent the values from the fields specified in Output Fields in the Details page to Tenable Vulnerability Management . In our example, the fields in the payload are Data Sources, First Time Seen, IP Address, Last Time Seen, Lucidum Asset Name, and Lucidum User Name.

Adding Actions to MetaBlocks #

Lucidum includes a feature called MetaBlocks. MetaBlocks allow you to group Dashboards, Connectors, Actions, SmartLabels, and Saved Queries, similar to how you would use a folder. You can store related items in a single MetaBlock.

To add an Action to a MetaBlock:

  1. Choose Actions from the left pane.
  2. In the Actions page, choose from the action types in the Categories pane or click on an icon in the right pane.
  3. In the Configured Actions pane, find the action profile you want to edit. Click its Menu icon. Choose Assign MetaBlocks.

    actions_configured_actions_metablocks_25.0.png

  4. In the Assign MetaBlocks modal page, select one or more MetaBlocks to align with the Action profile.

    actions_configured_actions_metablocks__add_delete_25.0.png

  5. Click Assign.

Viewing MetaBlocks Aligned with an Action #

To view the MetaBlocks associated with an Action profile:

  1. Choose Actions from the left pane.
  2. In the Actions page, choose from the action types in the Categories pane or click on an icon in the right pane.
  3. In the Configured Actions pane, find the action profile you want to edit. Click its Menu icon. Choose Assign MetaBlocks.

    actions_configured_actions_metablocks_25.0.png

  4. In the Assign MetaBlocks modal page, the MetaBlocks field displays the list of MetaBlocks associated with the Action.

    actions_configured_actions_metablocks__add_delete_25.0.png

  5. Click Assign.

Deleting Actions from MetaBlocks #

To delete an Action from a MetaBlock:

NOTE: This will not delete the Action or the MetaBlock. This action removes the relationship between the Action and the MetaBlock.

  1. Choose Actions from the left pane.
  2. In the Actions page, choose from the action types in the Categories pane or click on an icon in the right pane.
  3. In the Configured Actions pane, find the action profile you want to edit. Click its Menu icon. Choose Assign MetaBlocks.

    actions_configured_actions_metablocks_25.0.png

  4. In the Assign MetaBlocks modal page, the MetaBlocks field displays the list of MetaBlocks associated with the Action.

    actions_configured_actions_metablocks__add_delete_25.0.png

  5. To delete one of the MetaBlocks, click on its Delete (trash can) icon.
  6. Click Assign.

Deleting an Action #

To delete an action:

  1. Choose Actions from the left pane.
  2. In the Actions page, click an icon in the right pane.
  3. In the Configured Actions pane, find the action and configuration you want to delete

    actions_new_ui_numbers.png

  4. Click its Menu icon.
  5. Click Delete.
  6. In the modal, click Confirm.

Action Limits in Lucidum #

  • Each action can include up to 5,000 records.
  • You can trigger actions to run as frequently as every 5 minutes.
What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on November 21, 2025
Table of Contents
  • What Are Actions?
  • Structure of Actions
  • Viewing the Actions page
  • Viewing the Configured Actions page
  • List of Actions
  • Workflow for Creating Configurations and Actions in Lucidum
    • Create a New Configuration
    • Create a New Action
  • Workflow Using Clone to Create a New Action
  • Alternative Workflow for Creating an Action
  • Workflow for Editing a Configuration
  • Workflow for Editing an Action
  • Workflow for Creating an Action Token
  • Viewing Status of an Existing Action and Executing an Action On-Demand
  • Action Results
  • Adding Actions to MetaBlocks
  • Viewing MetaBlocks Aligned with an Action
  • Deleting Actions from MetaBlocks
  • Deleting an Action
  • Action Limits in Lucidum

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube X-twitter Facebook

@ 2025 Lucidum, Inc. Design By Sandman Studios

SOLUTIONS

COMPANY

RESOURCES

Solutions

  • Modernize Sec Ops
  • Risk & Vulnerability
  • Data Management
  • CISO Tool Kit

COMPANY

  • About Us
  • Testimonials
  • Patents

Resource Library

  • Documentation
  • E-Books
  • White Papers
  • Videos
  • Blogs