After Lucidum has ingested data, you can view dashboards and charts in the Dashboards page. These dashboards and charts provide insights into your environment.
This chapter will show some common use cases for dashboards.
For more use cases and dashboards, see the manual on Use Cases.
All Assets and All Users #
Lucidum finds uses connected data sources and machine learning to find all devices, all users, all data and correlates them.
This dashboard provides an overview of the assets and users in your environment. You can drill down in this dashboard to see details about assets and users.
This dashboard displays:
-
All assets by type
-
List of all servers and VMs
-
List of all workstations
-
List of mobile devices
-
List of containers and microservices
-
All assets by data source
-
All users by department
-
All users by location
-
All users by manager
Assets Not Managed in Active Directory or LDAP #
This dashboard displays assets that have been found by Lucidum yet are not managed by Active Directory. In this dashboard, assets that are not in Active Directory are considered “unknown”.

The dashboard displays:
-
Count of all unknown assets.
-
Unknown assets and their known risks
-
Unknown assets without endpoint protection
-
Unknown assets with critical vulnerabilities
-
Unknown assets with high vulnerabilities
-
Unknown assets with critical CVEs
-
Unknown assets and the services that are listening on those assets
-
Unknown assets that are accessing files in the environment
-
Unknown workstations without VPN
-
Unknown assets by type
-
Unknown assets by department
Assets without an Endpoint Agent #
Here is a dashboard for a customer who uses Crowdstrike Falcon for endpoint management and security. This dashboard shows all assets where Crowdstrike Falcon is not installed.
The dashboard includes charts for:
- Total compute assets
- Assets in CrowdStrike
- Assets not in CrowdStrike (whitespace)
- Whitespace by OS category
- Whitespace month by month
- Whitespace by OS Version for Windows server
- Whitespace by OS Version for Windows Workstations
- Whitespace by OS Version for macOS
- Whitespace by OS Version for Linux
- Server Whitespace by Location for Windows Servers
- Workstation Whitespace by Location for Windows Workstations
- macOS Whitespace by Location
- Linux Whitespace by Location
Assets without Encryption #
Here is a dashboard about all assets with unencrypted data storage. This is especially useful for organizations working on SOC-2 compliance.

The dashboard includes charts for:
-
Unencrypted assets by type
-
Encrypted assets by type
-
Unencrypted assets by location
-
Unencrypted assets by manager
-
Users whose assets are not encrypted
Assets with End-of-Life Operating Systems #
This dashboard displays information about assets running operating systems that are no longer supported by the operating system vendor. Therefore, the vendor no longer releases security patches for these operating systems.
This dashboard includes charts for:
-
All Windows assets, sorted by OS version
-
Windows assets using EOL operating systems
-
All Macintosh assets, sorted by OS version
-
Macintosh assets using EOL operating systems
-
Windows assets using EOL operating systems, by owner
-
Windows assets using EOL operating systems, by manager
-
Windows assets using EOL operating systems, by owner
-
Windows assets using EOL operating systems, by manager
-
Macintosh assets using EOL operating systems, by owner
-
Macintosh assets using EOL operating systems, by manager
Disabled Users (Zombies) #
Here’s a dashboard about users who have been disabled in Active Directory but still appear active in the environment. These accounts are known as zombie accounts and create a security risk.

This dashboard includes charts for:
-
All users who have been disabled in Active Directory
-
All users who have been disabled in Active Directory yet have been seen in the environment in the last 5 days
-
All users who have been disabled in Active Directory yet have accessed files in the environment in the last 5 days
-
All users who have been disabled yet have logged in to the VPN in the last 5 days
-
All users who have been disabled in Active Directory and whose accounts allow access to secure assets
-
All users who have been disabled yet have logged in to the VPN in the last 5 days and whose accounts have access to secure assets
Viewing Details in a Chart #
You can click on a chart and get details about the data in the chart.
-
For example, suppose a dashboard includes this chart:
-
Clicking on the slice “Value not exist” drills down and provides more details about that slice.
-
We can now see that there are 26 assets without a value for “asset type”.
-
Clicking on Edit filters and then Show Result displays the details about all the assets with no value for “asset type”. You can click the Edit Column button to display more columns or a different set of columns.
-
Clicking the blue > leads to the Details page, where you can view more information about a specific asset:
-
Clicking on a link on the left displays a different category of information about the asset.
You can also drill down into charts about users.
-
For example, suppose a dashboard includes this chart:
-
Mousing over the bar “Security” displays the number of users in that department.
-
Clicking on the “Security” bar displays the Query Results for the main query for the chart, further filtered by “Department == Security”. You can click the Edit Column button to display more columns or a different set of columns.
-
Clicking the blue > leads to the Details page, where you can view more information about a specific user:
-
Clicking on a link on the left displays a different category of information about the user.