Introduction #
Lucidum includes pre-built dashboards, called Value-Oriented Dashboards or VODs.
VODs display common use cases to help you get immediate insights from Lucidum.
Lucidum includes a feature called Dashboards. Dashboards allows you to view and create dashboards.
Lucidum also includes pre-built dashboards, called Value-Oriented Dashboards or VODs.
Value-Oriented Dashboards display common use cases, such as asset inventory, risk overview, endpoint management, and more.
Some of the Value-Oriented Dashboards might immediately suit your needs and will not require editing. Other Value-Oriented Dashboards might require editing for your environment. You can use the Value-Oriented Dashboards as templates to create dashboards that are customized to your environment.
Dashboards #
See the manual on Dashboards for details on:
-
writing, editing, and managing queries.
Editing Value-Oriented Dashboards #
By default, Value-Oriented Dashboards cannot be edited. They are read-only.
However, you can copy a Value-Oriented Dashboard to a channel where you have read and write permissions and then edit the dashboard and the charts in the dashboard.
-
Log in to your Lucidum system.
-
In the left menu, click Dashboards.
-
In the Channel pane, click the channel where the dashboard lives.
-
In the right pane, find the dashboard you want to edit. Click its Clone (pages) icon.
-
The Clone This Dashboard page appears.
-
In the Clone This Dashboard page, select a channel to store the cloned dashboard.
-
The cloned dashboard appears in that channel, with “_copy” appended to its name.
After copying a Value-Oriented Dashboard, you can:
Connectors #
Connectors allow Lucidum to ingest data from your environment and discover, identify, and classify assets, data, and users.
Lucidum includes pre-built connectors for the most commonly used solutions.
For details on configuring connectors, see the manual on Connectors.
List of Value-Oriented Dashboards #
The following sections describe all the Value-Oriented Dashboards.
Cloud #
-
AWS All-in-One. This dashboard displays information about the AWS resources in your environment, including EC2 instances, S3 buckets, and security groups.
-
Azure All-In-One. This dashboard displays information about the Azure instances (VMs, blob containers, and security groups) in your environment..
-
Cloud Compute Summary. This dashboard displays information about all cloud compute instances from all providers.
- Cloud Tagging Enforcement. Tagging is the process of using a consistent, descriptive naming strategy for cloud instances. This dashboard displays instances that are not properly tagged and provides statistics about the tags in use.
-
Multi-Cloud Consolidated Compute. This dashboard displays information about the compute resources in all the clouds in your environment. Compute resources are those resources that include CPU and memory and usually run software.
-
Multi-Cloud Idle Instance Spend. This dashboard displays information about idle cloud instances and the cost of those idle cloud instances.
-
Multi-Cloud Individual Compute. This dashboard displays information about the compute resources in each cloud in your environment. Compute resources are those resources that include CPU and memory and usually run software.
-
Multi-Cloud Public Cloud Object Stores. This dashboard includes information about all storage resources in all the clouds in your environment.
Identity #
- Compliance: Okta MFA Status. Tracks compliance with MFA use (as tracked by Okta) and identifies non-compliant accounts.
-
Identities. This dashboard displays a table with a list of all users in Lucidum
-
Identity Overview. This dashboard displays information about users, their status (deprovisioned, suspended, unauthorized, unmanaged), and their access to your environment.
-
Unauth User Accounts. This dashboard displays information about users, their authentication status, and their access.
Inventory #
-
Asset Inventory. This dashboard displays information about assets including data sources, risk level, critical vulnerabilities, location, type, operating systems, ISPs, CVEs, and users.
-
Asset Overview w/Users. This dashboard displays details about assets including asset types, servers, VMs, workstations, mobile devices, containers, microservices, and information about users for those assets.
-
Assets. This dashboard lists all the assets in your Lucidum system and details about each asset.
-
Change Tracking. This dashboard displays information about assets and users over time.
-
Compute Asset Inventory. The Compute Asset Inventory dashboard displays details about compute assets and their operating systems.
-
Coverage Gaps: CrowdStrike. This dashboard displays information about assets that are not running CrowdStrike, including a monthly burndown chart to track new CrowdStrike installations.
-
Coverage Gaps: Rapid7. This dashboard displays information about assets that are not running Rapid7, including a monthly burndown chart to track new Rapid7 installations.
-
Coverage Gaps: SentinelOne. This dashboard displays information about assets that are not running SentinelOne, including a monthly burndown chart to track new SentinelOne installations.
-
Coverage Gaps: Tenable Agent. This dashboard displays information about assets that are not running Tenable, including a monthly burndown chart to track new Tenable installations.
-
Lucidum System Summary. This dashboard displays security information assets, users, risk, and vulnerabilities.
-
New Assets & Users (Prev. 7 Days). The New Assets & Users (Prev. 7 Days) dashboard displays information about the assets and users first seen in the last seven days.
-
Patching Summary. The Patching Summary dashboard displays information about assets that require patching, including a table with details about each asset that requires patching.
-
Users & Assets. This dashboard displays information about assets, asset types, and the associated users.
-
VMware Summary. This dashboard provides details about all VMware assets, including datacenters, clusters, hosts, VMs, datastores, resource pools, switches, and port groups.
Security & IT Ops #
-
Certificate Summary. This dashboard displays information about SSL certificates, including information about the key algorithms, expiry dates, CA, and certificate versions.
- Crown Jewels. Crown Jewels is a term for the most critical assets in your organization. This dashboard displays information about the current status of Crown Jewels, including details about Crown Jewels with CVEs, KEVs, and fixable KEVs.
-
EOL Operating Systems (KEVs). This dashboard provides information about Windows, macOS, and Linux operating systems that have reached end-of-life (EOL) and those EOL operating systems that have known exploited vulnerabilities (KEVs).
-
EOL Operating Systems (Online Assets). This dashboard provides information about Windows, macOS, and Linux operating systems that have reached end-of-life (EOL) and are still online.
- Exposed Assets. The Exposed Assets dashboard displays assets that are publicly exposed with an external port.
-
Priorities: All KEVs. Displays information about assets with Known Exploited Vulnerabilities (KEVs), including which of those KEVs are high or critical and which of those KEVs have solutions or workarounds.
-
Priorities: Fixable KEVs. Displays information about assets with Known Exploited Vulnerabilities (KEVs), including which of those KEVs are high or critical, which of those KEVs have solutions or workarounds, and which assets in the environment are not scanned for KEVs.
-
Priorities: Highs & Crits. Displays information about assets with High or Critical CVEs, including information about KEVs in the environment and which of those KEVs have solutions or workarounds.
Threat Intelligence #
-
Assets w/Top Exploited CVEs (CISA 2021). This dashboard displays information about assets with CVEs.
-
Assets w/Top 15 Exploited CVEs (SentinelOne 2022). The Assets w/Top 15 Exploited CVEs dashboard displays information about assets where the top 15 most commonly exploited CVEs are active.
-
Kaspersky Top-n APTS: 2023. Advanced Persistent Threats (APTs) targeting enterprise infrastructures exploit existing software vulnerabilities. Kaspersky analyzed available data on exploits used in APT attacks for 2023 and Q1 2024 to determine which software is most frequently exploited by attackers. Below are the vulnerabilities that APT groups leveraged the most in 2023 and Q1 2024 and the assets in your environment that are at risk.
-
Risk & Threat Overview. This dashboard displays details about risks and threats for the assets in your environment.
-
Risk & Vuln Overview. This dashboard displays details about all risk and all vulnerabilities in the environment.
-
Vulnerabilities. This dashboard displays a list of all vulnerabilities in your environment.