Skip to content
Login

Lucidum has been acquired by Cyderes → [Read the announcement]

Lucidum has been acquired by Cyderes → [Read the announcement]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • White Papers
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Acquia Security
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • Barracuda CloudGen Firewall
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • Imprivata Privileged Access Management
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • Z
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Client Connector
      • Zscaler Deception
      • Zscaler Internet Access
      • Zscaler Private Access

Viewing Data

  • Overview of the Lucidum Data Model
  • Quick Start: Understanding Data in Your Lucidum System
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using MetaBlocks with Saved Queries
  • Using Queries with Nested Lists
  • Appendix: Fields in the Lucidum Data Group
  • Appendix: Data Types, Operators, and Regular Expressions

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Using MetaBlocks with Dashboards
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Introduction to Tags and Smart Labels
  • Overview of Tags
  • Migrating Custom Fields to Tags
  • Creating and Managing Tags
  • Overview of SmartLabels
  • Migrating Dynamic Fields to SmartLabels
  • Creating and Managing SmartLabels
  • Using Functions in SmartLabels
  • Using MetaBlocks with SmartLabels
  • Exporting and Importing SmartLabels
  • Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Overview of Value-Oriented SmartLabels
  • Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks
  • Exporting and Importing MetaBlocks
  • Example MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • SailPoint Actions
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Introduction to Risk
  • Risk Measurements

Use Cases

  • Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Incident Response
    • Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Endpoints for SmartLabels
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • API Token Management
  • Data Scheduler
  • License Settings
  • Notifications
  • System Preferences
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Introduction to Lucidum MoM
  • Adding Lucidum Systems (Deployments) to MoM
  • Adding Users to MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Value-Oriented Dashboards (VODs)
  • Threat Intelligence Dashboards

Threat Intelligence Dashboards

Estimated Reading Time: 21 min read

The pre-built Value-Oriented Dashboards include the following Threat Intelligence dashboards:

  • Assets w/Top Exploited CVEs (CISA 2021). This dashboard displays information about assets with CVEs.

  • Assets w/Top 15 Exploited CVEs (SentinelOne 2022). The Assets w/Top 15 Exploited CVEs dashboard displays information about assets where the top 15 most commonly exploited CVEs are active.

  • Kaspersky Top-n APTS: 2023. Advanced Persistent Threats (APTs) targeting enterprise infrastructures exploit existing software vulnerabilities. Kaspersky analyzed available data on exploits used in APT attacks for 2023 and Q1 2024 to determine which software is most frequently exploited by attackers. Below are the vulnerabilities that APT groups leveraged the most in 2023 and Q1 2024 and the assets in your environment that are at risk.

  • Risk & Threat Overview. This dashboard displays details about risks and threats for the assets in your environment.

  • Risk & Vuln Overview. This dashboard displays details about all risk and all vulnerabilities in the environment.

  • Vulnerabilities. This dashboard displays a list of all vulnerabilities in your environment.

Required Connectors #

To find all the assets in your environment and the vulnerability, CVE, and risk information about the assets in your environment, Lucidum recommends you configure Lucidum connectors for:

  • The Endpoint Management solutions in your environment (for example, Jamf, Intune, Citrix Endpoint Management, Symantec Endpoint Management, Hexnode)

  • The Endpoint Protection solutions in your environment (for example, Trellix Endpoint Security, Symantec Endpoint Protection, SentinelOne, Crowdstrike Falcon, Microsoft Defender for Endpoint )

  • The Endpoint Detection and Response solutions in your environment (for example, SentinelOne, Falcon Crowdstrike, Trend Micro XDR, Check Point Harmony Endpoint, Cortex XDR)

  • The cloud security solutions in your environment for cloud assets (for example, Netskope, Illumio Core, Orca, Tenable Vulnerability Management, Trend Micro Cloud One, Sophos Central)

  • The anti-virus solutions or vulnerability management solutions in your environment (for example, Burp Suite, Cycognito, Greenbone, Kenna, MS Defender, Qualys, Rapid7, Tenable, Vulcan)

  • The Mobile Device Management solutions in your environment (for example, Addigy, Citrix Endpoint, Jamf Pro, Kandji)

  • The directory solutions in your environment (For example, Azure AD, Microsoft AD, Jump Cloud, PingOne, OpenLDAP,)

  • The DHCP solutions in your environment (For example, Infoblox, Efficient IP, BlueCat)

  • The VPN solutions in your environment (For example, Cisco AnyConnect, FortiClient, Palo Alto VPN, Citrix Gateway, Zscaler Private Access)

  • The cloud solutions in your environment (for example, AWS, Azure, Google Cloud, Oracle Cloud)

Assets w_Top Most Exploited CVEs (CISA 2021) #

The Assets /w the Most Exploited CVEs dashboard displays information about assets with CVEs.

The Assets /w the Most Exploited CVEs dashboard looks like this:

vods_threat_intel_assets_w_top_exploited_cves_cisa2021_24.0.png

Base Query #

Most of the asset charts in this dashboard this query:

CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199).

This query looks for assets that have one or more of the following active CVEs:

  • CVE-2021-44228

  • CVE-2021-40539

  • CVE-2021-34523

  • CVE-2021-34473

  • CVE-2021-31207

  • CVE-2021-27065

  • CVE-2021-26858

  • CVE-2021-26857

  • CVE-2021-26885

  • CVE-2021-26084

  • CVE-2021-21972

  • CVE -2020-1472

  • CVE -2020-0688

  • CVE -2019-11510

  • CVE-2018-13379

  • CVE-2021-3156

  • CVE-2021-27852

  • CVE-2021-22893

  • CVE-2021-20016

  • CVE-2021-1675

  • CVE-2021-42237

  • CVE-2021-35464

  • CVE-2021-27104

  • CVE-2021-27103

  • CVE-2021-27102

  • CVE-2021-27101

  • CVE-2021-21985

  • CVE-2021-20038

  • CVE-2021-40444

  • CVE-2021-34527

  • CVE-2020-2509

  • CVE-2019-19781

  • CVE-2019-18935

  • CVE-2018-0171

  • CVE-2017-11882

  • CVE-2017-0199

If you want to edit the charts in this dashboard, you can supply a different list of CVEs in the query.

Charts #

  • Asset Count. This chart displays the count of assets with active CVEs.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum Asset Name.

    • The Chart Type is “Big Number”.

  • Active CVEs. This chart looks at all assets with active CVEs and displays which CVEs are present in the environment.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum Asset Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays CVE List.

    • The Chart Type is “Pie”.

  • Operating Systems Affected. This chart displays all the operations systems and versions in the environment that are affected by CVEs.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum Asset Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays a Lucidum OS Version.

    • The Chart Type is “Pie”.

  • Vulnerable Assets. This chart lists the names of assets that have active CVEs.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, CVE Count (Vulnerabilities::CVE)

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each Lucidum Asset Name.

    • The Chart Type is “Table”.

  • Remediation Progress. This chart displays the number of assets that still have active CVEs each day.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Record Generated Time.

    • The Chart Type is “Bar”.

  • Assets with Common Exploits. This chart displays the CVEs with the highest number of associated assets.

    • This chart queries the asset database and uses the query CVE List match -2021-(44228|40539|34523|34473|31207|27065|26858|26857|26855|26084|21972) OR CVE List match -2020-(1472|0688) OR CVE List match -2019-(11510) OR CVE List match -2018-(13379)OR CVE List match -2021-(3156|27852|22893|20016|1675) OR CVE List match -2021-(42237|35464|27104|27103|27102|27101|21985|20038|40444|34527) OR CVE List match -2020-(2509) OR CVE List match -2019-(19781|18935) OR CVE List match -2018-(0171) OR CVE List match -2017-(11882|0199). This query looks for all assets that have one or more of these CVEs in their CVE list.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each entry in the CVE List.

    • The Chart Type is “Table”.

Assets w_Top15 Exploited CVEs (SentinelOne 2022) #

The Assets w/Top15 Exploited CVEs dashboard displays information about assets where the top 15 most commonly exploited CVEs are active.

The Assets w/Top 15 Exploited CVEs dashboard looks like this:

vods_threat_intel_assets_w_top_15_exploited_cves_sentinelone2022_24.0.png

Base Query #

Most of the asset charts in this dashboard use this query:

CVE List match -2021-(44228|40539|31207|34473|34523|26885|26857|26858|27065|26084|21972) or CVE List match -2020-(1472|0688) or CVE List match -2019-11510 or CVE List match -2018-13379.

This query looks for assets that have one or more of the following active CVEs:

  • CVE-2021-44228

  • CVE-2021-40539

  • CVE-2021-31207

  • CVE-2021-34473

  • CVE-2021-34523

  • CVE-2021-26885

  • CVE-2021-26857

  • CVE-2021-26858

  • CVE-2021-27065

  • CVE-2021-26084

  • CVE-2021-21972

  • CVE -2020-1472

  • CVE -2020-0688

  • CVE -2019-11510

  • CVE-2018-13379

Charts #

  • Asset Count. This chart displays the count of assets with active CVEs.

    • This chart uses the base query. The base query looks for assets that have one or more of the top15 active CVEs:

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum Asset Name.

    • The Chart Type is “Big Number”.

  • Active CVEs. This chart looks at all assets with active CVEs and displays which CVEs are present in the environment.

    • This chart uses the base query.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum Asset Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays an entry from the CVE List.

    • The Chart Type is “Pie”.

  • Operating Systems Affected. This chart displays all the operations systems and versions in the environment that are affected by CVEs.

    • This chart uses the base query.

    • From the data returned by the query, the Category field specifies the values to use to calculate the entire pie. In this case, the entire pie is the total count of Lucidum Asset Names.

    • From the data returned by the query, the Series field specifies the value to show in each slice of the pie. In this case, each slice displays one of the Lucidum OS Version.

    • The Chart Type is “Pie”.

  • Vulnerable Assets. This chart lists the names of assets that have active CVEs.

    • This chart uses the base query.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, CVE Count (Vulnerabilities::CVE)

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each Lucidum Asset Name.

    • The Chart Type is “Table”.

  • Remediation Progress. This chart displays the number of assets that still have active CVEs each day.

    • This chart uses the base query.

    • From the data returned by the query, the Category field specifies the values to show on the x-axis. In this case, the x-axis displays a count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the values to show on the y-axis. In this case, the y-axis displays the Record Generated Time.

    • The Chart Type is “Bar”.

  • Assets with Common Exploits. This chart displays the CVEs with the highest number of associated assets.

    • This chart uses the base query.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each entry in the CVE List.

    • The Chart Type is “Table”.

Kaspersky Top-n APTs: 2023 #

Advanced Persistent Threats (APTs) targeting enterprise infrastructures exploit existing software vulnerabilities. Kaspersky analyzed available data on exploits used in APT attacks for 2023 and Q1 2024 to determine which software is most frequently exploited by attackers.

The Kaspersky Top-n APTSs: 2023 dashboard displays the vulnerabilities that APT groups leveraged the most in 2023 and Q1 2024 and the assets in your environment that are at risk. You can view the Kaspersky list at https://securelist.com/vulnerability-report-q1-2024/112554/.

The Kaspersky Top-n APTSs: 2023 dashboard looks like this:

vods_threat_intel_kaspersky_topn_apts_2023_24.0.png

Base Query #

Most of the asset charts in this dashboard use this query:

Kaspersky Top-n Exploited Vulns: 2023 == True

This query looks for assets where the field Kaspersky Top-n Exploited Vulns: 2023 is True. This field is a SmartLabel that specifies:

CVE List match CVE-2023-38831, CVE-2017-11882, CVE-2017-0199, CVE-2021-44228, CVE-2023-36884, CVE-2023-27350, CVE-2022-47966, CVE-2021-34523, CVE-2021-34473, CVE-2020-1472

Charts #

  • Kaspersky Top-10 Exploited APTs: 2023. This chart displays the count of assets with active CVEs in the Kaspersky Top-10 Exploited APTs for 2023.

    • This chart uses the base query. The base query looks for assets that have one or more of the  active CVEs: CVE-2023-38831, CVE-2017-11882, CVE-2017-0199, CVE-2021-44228, CVE-2023-36884, CVE-2023-27350, CVE-2022-47966, CVE-2021-34523, CVE-2021-34473, CVE-2020-1472

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum Asset Name returned by the query.

    • The Chart Type is “Big Number”.

  • Kaspersky Top-10 Exploited APTs: 2023. This chart displays a table of each Kaspersky Top-10 CVE and the number of assets affected by the CVE.

    • This chart uses the base query.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each entry in the CVE List.

    • The Chart Type is “Table”.

  • Kaspersky Top-10 Exploited APTs: 2023 Affected Assets. This chart displays details about the assets that are affected by the Kaspersky Top-10 CVEs.

    • This chart uses the base query.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the columns are Lucidum Asset Name, Instance Name, Lucidum OS Version.

    • The Chart Type is “Table”.
  • Kaspersky Top-10 Exploited APTs: 2023 Vuln Details. This chart displays details about the vulnerabilities in the Kaspersky Top-10 CVEs.

    • This chart uses the base query.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the columns are CVE List, # of Assets, NVD Published Time, CVSS Severity, and Lucidum Verified Risk.

    • The Chart Type is “Table”.

Risk & Threat Overview #

The Risk & Threat Overview dashboard displays details about risks and threats for the assets in your environment.

Risks are potential vulnerabilities in the environment. For example, unencrypted assets or known exploited vulnerabilities that exist in the environment are risk factors. Risk measurement include the likelihood that the vulnerabilities will be exploited and the impact on the environment if the vulnerability is exploited. Lucidum ingests data about assets and uses machines learning to finds risks and calculate risk measurements.  Lucidum calculates:

  • Risk Factor

  • Risk Score

  • Risk Ranking

  • Risk Level

Threats are related to actors or actions that exploit vulnerabilities. Threats include malware, ransomware, DDoS attacks, and stolen credentials. Lucidum ingests threat data from products in your environment that provide threat intelligence. Lucidum aligns this ingested data with assets and uses the threat intelligence when calculating risk measurements.

The Risk & Threat Overview dashboard looks like this:

vods_threat_intel_risk_threat_overview_24.0.png

Base Query #

  • Most of the asset charts in this dashboard use a query like:

Online Compute == TRUE AND Last Time Seen within page 1 month

  • This query searches for all compute assets that are online and have been active within the last month.

  • The field Online Compute is a SmartLabel that specifies Lucidum OS Category in Microsoft Windows, Linux, macOS, Unix, VMware AND IP Address exists AND Lucidum Status match Online. This query finds assets that are running a compute OS, are online, and have an IP address (to weed out containers).

Charts #

  • Compute Assets Online: Total. This chart displays the total count for all compute assets.

    • This chart queries the asset database and uses the query Online Compute == TRUE AND Last Time Seen within past 1 month. This query finds all online compute assets that have been active in the last month.

    • From the data returned by the query, the Category field specifies the value to show in the chart. In this case, the chart displays a count of Lucidum Asset Name instances.

    • The Chart Type is “Big Number”.

  • Compute Asset Risks by Risk Level. This chart displays compute assets organized by risk level (low, medium, and high).

    • This chart queries the asset database and uses the query Online Compute == TRUE AND Last Time Seen within past 1 month. This query finds all online compute assets that have been active in the last month.

    • From the data returned by the query, the Category field specifies the value of the entire pie. In this case, the entire pie is the count of Lucidum Asset Name returned by the query.

    • From the data returned by the query, the Series field specifies the value to show in each slice of pie. In this case, the chart displays Risk Level in each slice.

    • The Chart Type is “Pie”.

  • Compute Asset Risk by Department. This chart displays compute assets, organized by department.

    • This chart queries the asset database and uses the query Online Compute == TRUE AND Last Time Seen within past 1 month. This query finds all online compute assets that have been active in the last month.
    • From the data returned by the query, the Category field specifies the value to show in the x-axis. In this case, the chart displays a count of Lucidum Asset Name.

    • From the data returned by the query, the Series field specifies the value to show in the y-axis. In this case, the chart displays Department.

    • The Chart Type is “Bar”.

  • Compute Asset Risk Factors. This chart displays compute assets organized by risk factors.
    • This chart queries the asset database and uses the query Online Compute == TRUE AND Last Time Seen within past 1 month AND Risk Factors exists. This query finds all online compute assets that have been active in the last month and include Risk Factors.

    • From the data returned by the query, the Category field specifies the value of the entire pie. In this case, the entire pie is the count of Lucidum Asset Name returned by the query.

    • From the data returned by the query, the Series field specifies the value to show in each slice of pie. In this case, the chart displays Risk Factors in each slice.

    • The Chart Type is “Pie”.

  • Threats Reported. This charts displays a list of threats that exist in the environment and the number of assets affected by each threat.
    • This chart queries the asset database and uses the query Online Compute == True AND Last Time Seen within past 1 month AND Threat List exists. This query finds all online compute assets that have been active in the last month and include a Threat List.
    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the columns are a count of Lucidum Asset Name associated with each threat.

    • From the data returned by the query, the Series field specifies the row in the table. In this case, the table will have a row for each Threat List.

    • The Chart Type is “Table”.

  • High-Risk Assets by Risk Ranking. This chart displays details about each asset that has a Risk Level of High.

    • This chart queries the asset database and uses the query Online Compute == True AND Last Time Seen within past 1 month AND Risk Level match 3-high. This query finds all online compute assets that have been active in the last month and have a Risk Level of High.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the columns are Latest Asset Name, Risk Ranking, Person Full Name, Lucidum OS Version, Department, Location, and Risk Factors.

    • The Chart Type is “Table”.

Risk & Vuln Overview #

The Risk & Vuln Overview dashboard displays information about all risk and all vulnerabilities in the environment.

Vulnerabilities are weaknesses in a system that can be exploited by attackers. Lucidum ingests vulnerability data from:

  • Vulnerability Management applications in your environment
  • (Common Vulnerability Scoring System) from the National Vulnerability Database (NVD) from National Institute of Standards and Technology (NIST). Provides both a score and a severity for vulnerabilities.>

  • Known Exploited Vulnerabilities (KEV) from the Cybersecurity and Infrastructure Security Agency (CISA). Identifies exploited vulnerabilities and KEVs with fixes. >

  • EPSS (Exploit Prediction Scoring System) from the Forum of Incident Response and Security Teams (FIRST). Estimates the likelihood (probability) that a software vulnerability will be exploited in the wild.

  • CVE Fix from CVE.org. Lists the fixes and workarounds for a CVE if available.

  • Risks are potential vulnerabilities in the environment. For example, unencrypted assets or known exploited vulnerabilities that exist in the environment are risk factors. Risk measurement include the likelihood that the vulnerabilities will be exploited and the impact on the environment if the vulnerability is exploited. Lucidum ingests data about assets and uses machines learning to finds risks and calculate risk measurements.  Lucidum calculates:

    • Risk Factor

    • Risk Score

    • Risk Ranking

    • Risk Level

    The Risk & Vuln Overview dashboard looks like this:

    vods_threat_intel_risk_vuln_overview_24.0.png

    Base Query #

    • Most of the asset charts in this dashboard use a query like:

    Online Compute == TRUE

    • The field Online Compute is a SmartLabel that specifies Lucidum OS Category in Microsoft Windows, Linux, macOS, Unix, VMware AND IP Address exists AND Lucidum Status match Online. This query finds assets that are running a compute OS, are online, and have an IP address (to weed out containers).

    Charts #

    • Online Compute Assets: Risk by Ranking. This chart displays the number of online compute assets per risk ranking.

      • This chart queries the asset database and uses the query Online Compute == TRUE. This query finds all online compute assets.
      • From the data returned by the query, the Category field specifies the value to show in the x-axis. In this case, the chart displays a count of Lucidum Asset Name.

      • From the data returned by the query, the Series field specifies the value to show in the y-axis. In this case, the chart displays Risk Ranking.

      • The Chart Type is “Bar”.

    • Online Computer Assets by Risk Level. This chart displays compute assets organized by risk level (low, medium, and high).

      • This chart queries the asset database and uses the query Online Compute == TRUE. This query finds all online compute assets.

      • From the data returned by the query, the Category field specifies the value of the entire pie. In this case, the entire pie is the count of Lucidum Asset Name returned by the query.

      • From the data returned by the query, the Series field specifies the value to show in each slice of pie. In this case, the chart displays Risk Level in each slice.

      • The Chart Type is “Pie”.

    • Online Compute Assets. This chart displays risk details for each online compute asset.

    • This chart queries the asset database and uses the query Online Compute == TRUE. This query finds all online compute assets.
    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, the columns are Latest Asset Name, Lucidum OS Version, Department, Risk Score, Risk Ranking, Risk Level, Risk Factor Count, KEV Count, and All Vulns.

    • The Chart Type is “Table”.

    Vulnerabilities #

    The Vulnerabilities dashboard lists all the identities in your Lucidum system and details about each identity.

    The Vulnerabilities dashboard looks like this:

    VODs_threats_vulnerabilities_24.0.png

    Base Query #

    • This dashboard includes a single chart.

    • The chart queries the Vulnerability database and uses the query CVE List to find all vulnerabilities in your Lucidum system.

    Charts #

    • This dashboard includes a single chart.

    • From the data returned by the query, the Category fields specifies the columns in the table. In this case, CVE Description, CVE List, Number of Assets, CVE Software::Name, CVE Software::Type CVE Software::Vendor, CVSS Severity, Known Exploited Vulnerability, Fixable, CVSS Score, CVSS Version, Lucidum Verified Risk, EPSS Score, EPSS Percentile.

    • The Chart Type is “Table”.

    In the Vulnerabilities dashboard, you can view the following about each asset:

    • CVE Description. Description of the CVE, as described by Mitre.
    • CVE List. The ID for the CVE, as provided by Mitre.

    • # of Assets. Number of assets affected by thge CVE.

    • CVE Software Name. One or more software packages affected by the CVE.

    • CVE Software Type. Software package and type affected by the CVE.

    • CVE Software Vendor. Vendors associated with the entries in CVE Software Name.

    • CVSS Severity. Severity in the Common vulnerability scoring system. A mathematical/statistical scoring for vulnerabilities. Maintained by FIRST (forum of incident response and security teams).

    • KEV. Specifies if this is a Known Exploited Vulnerability, as specified by CISA.

    • Fixable. Specifies if there is a fix for the CVE.

    • CVSS Score. Score in the Common vulnerability scoring system. A mathematical/statistical scoring for vulnerabilities. Maintained by FIRST (forum of incident response and security teams). Range is 0 (no risk) – 10 (critical risk).

    • CVSS Version. Version of the Common vulnerability scoring system. Each version of CVSS includes improved metrics and formulas. Possible versions v2 (released 2007), v3.0 (2015), v3.1 (2019), and v4.0 (2023).

    • Lucidum Verified Risk. Lucidum Verified Risk is a single score applied to each CVE in your environment. The score is between 1-100, with 100 being the highest score. The higher the score, the higher the risk for that CVE. Lucidum Verified Risk is like a credit score for a vulnerability, combining available vulnerability data and data about your environment. For details, see Lucidum Verified Risk.

    • EPSS Score. Score in the Exploit prediction scoring system. A mathematical/statistical scoring for exploits. Maintained by FIRST (forum of incident response and security teams).

    • EPSS Percentile. Percentile in the Exploit prediction scoring system. A mathematical/statistical scoring for exploits. Maintained by FIRST (forum of incident response and security teams).

    For each column name, you can:

    • Sort by ASC. Sort the results by this column, in ascending order.

    • Sort by DESC. Sort the results by this column, in descending order.

    • Pin to left. The column is pinned to the left border. When you scroll left to right to view all the columns, this column stays on the left border.

    • Pin to right. The column is pinned to the right border. When you scroll left to right to view all the columns, this column stays on the right border.

    • Filter. Allows you to filter the table by one or more columns in the results table.

    • Hide Column. Removes the column from the page.

    • Manage columns. You can include or not include one or more columns in the results table.

What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on February 6, 2026
Security & IT Ops DashboardsOverview of Value-Oriented Dashboards
Table of Contents
  • Required Connectors
  • Assets w_Top Most Exploited CVEs (CISA 2021)
    • Base Query
    • Charts
  • Assets w_Top15 Exploited CVEs (SentinelOne 2022)
    • Base Query
    • Charts
  • Kaspersky Top-n APTs: 2023
    • Base Query
    • Charts
  • Risk & Threat Overview
    • Base Query
    • Charts
  • Risk & Vuln Overview
    • Base Query
    • Charts
  • Vulnerabilities
    • Base Query
    • Charts

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube

@ 2025 Lucidum, Inc. Design By Sandman Studios