Skip to content
Login

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Videos
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberArk Identity Security Platform Shared Services (ISPSS)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshdesk
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Cloud
      • Google Security Operations SIEM
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • PingID
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Protected: Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using Queries with Nested Lists
  • Protected: Appendix: Fields and Regular Expressions
  • Appendix: Data Types and Operators

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Protected: Introduction to Tags and Smart Labels
  • Protected: Overview of Tags
  • Protected: Migrating Custom Fields to Tags
  • Protected: Creating and Managing Tags
  • Protected: Overview of SmartLabels
  • Protected: Migrating Dynamic Fields to SmartLabels
  • Protected: Creating and Managing SmartLabels
  • Protected: Using Functions in SmartLabels
  • Protected: Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Protected: Overview of Value-Oriented SmartLabels
  • Protected: Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Security Operations SIEM Actions
      • Google Security Operations SOAR Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Protected: Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Protected: Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Protected: Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Protected: Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • Data Scheduler
  • License Settings
  • Notifications
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Using MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Connectors
  • Using Connectors

Using Connectors

Estimated Reading Time: 13 min read

Connectors allow Lucidum to ingest data from your environment and discover, identify, and classify assets, data, and users.

Lucidum includes pre-built connectors for the most commonly used solutions for security, vulnerability scanning, cloud, data warehouse, identity management, logs, network, endpoint management, IP management, file sharing, and devops.

Profiles #

To configure a connector, you provide credentials that allow Lucidum secure, read-only access to a specific deployed solution. These credentials are called a profile.

A connector can have multiple profiles.

For example, you might have multiple profiles for an AWS connector.

  • One profile could provide access to a public-facing service.
  • Another profile could provide access to an internal server.

Viewing the List of Connectors #

To view the list of Connectors on your version of Lucidum:

  1. Navigate to the Lucidum UI.

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

    connectors_ui_updates-1.png

  4. The connectors are categorized as:

    • Errors. If a connector has one or more profiles with an error, the connector appears in the Errors pane. Note that a connector can appear in the Errors pane even if some profiles do not have errors. If a single profile has errors, the connector appears in the Errors pane.

    • Disabled. If a connector has one or more profiles that are disabled, and no profiles with errors, the connector appears in the Disabled pane. Note that a connector can appear in the Disabled pane even if some profiles are enabled. If a single profile is disabled, and there are no profiles with errors, the connector appears in the Disabled pane.

    • Enabled. If a connector has only profiles that are enabled, and no profiles have errors, the connector appears in the Enabled pane.

    • Available. These connectors have not been configured for use.

Viewing Details About the List of Connectors #

To view the list of Connectors on your version of Lucidum:

  1. Navigate to the Lucidum UI.

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

    connectors_ui_updates_numbers2-e1722876573555.png

  4. The Connectors page displays the following:

    • Errors pane. If a connector has one or more profiles with an error, the connector appears in the Errors pane. Note that a connector can appear in the Errors pane even if some profiles do not have errors. If a single profile has errors, the connector appears in the Errors pane.

    • Red icon that displays the number of profiles with errors.

    • Disabled pane. If a connector has one or more profiles that are disabled, and no profiles with errors, the connector appears in the Disabled pane. Note that a connector can appear in the Disabled pane even if some profiles are enabled. If a single profile is disabled, and there are no profiles with errors, the connector appears in the Disabled pane.

    • Gray icon that displays the number of profiles that are disabled.

    • Enabled pane. If a connector has only profiles that are enabled, and no profiles have errors, the connector appears in the Enabled pane.

    • Green icon that displays the number of enabled profiles.

    • Available pane. These connectors have not been configured for use.

    • Filter Connectors by Group. View connectors by categories like Cloud Security, Application Management, and Identity Access Management.

    • Search. Search for connectors by name.

Viewing Details About a Single Connector #

To view the status of a connector:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. When you find the connector you want to view, click on its icon.
  5. The Settings page appears.

    connector_config_numbers3.pn

  6. The Settings page displays the following:

    • 1. Description of the connector.

    • 2. Page icon. Click this icon to view documentation about the connector. The documentation appears in a new page.

    • 3. Plus-sign icon. Add a new profile.

    • 4. Edit icon. Edits the selected profile.

    • 5. Delete icon. Click this icon to delete a profile.

    • 6. Red toggle icon. Profile is enabled but has errors.

    • 7. Green toggle icon. Profile is enabled and does not have errors.

    • 8. Gray toggle icon. Profile is disabled.

    • 9. Key icon. AWS Key Management system is disabled (strikethrough) or enabled.

  7. To get immediate information about a connector, you can test the connector.

  8. For detailed logs about your connectors, contact Lucidum Customer Success.

Error Codes for Connectors #

API Error Code

General Meanings

Possible Resolutions

400

Bad Request Error.

Usually means that you did not correctly format your API request.

Check the connector documentation.

Validate that the connector parameters (for example, URL parameter or API key).

Validate the API payload. You could be missing a query, a field in the request body, or a header field could be wrong.

It could also be that some of your request data might have incorrect syntax.

401

Unauthorized Error.

Usually means you have not successfully authenticated against the API.

Check the credentials (username, password, or API token may be wrong)

403

Forbidden Error.

The forbidden status indicates that you do not have permission to request that URL.

Either your authentication failed or authentication was successful, but you do not have permissions to make the API request.

Check credentials and permissions/scopes. The user name or API token might not have the required permissions/scopes/roles assigned.

404

Not Found Error.

Indicates that the URL in your request does not exist on the API server.

This can also indicate a server problem.

Check the target URL/hostname/IP address. These might not be correct or reachable, or might need a tunnel proxy to access.

405

Method Not Allowed.

This indicates that the client tried to use an HTTP method (GET, POST, PUT, DELETE) that the resource does not allow.

For example, a read-only resource might not support POST, and a controller resource might allow GET and POST, but not PUT or DELETE.

Check the source API documentation and make sure the connector is using the correct request method.

Check the API version. Are you using an older API version that does not support specific methods?

Contact Lucidum technical support if you need to downgrade/upgrade your API. Lucidum can check make necessary changes to the connector code.

406

Not Acceptable.

Indicates that the API is not able to generate the client’s preferred media types, as indicated by the Accept request header.

For example, a client request for data formatted as application/xml generates a 406 response if the API formats data only as application/json.

Check the source documentation for the API to find the supported media types.

Check the request header for the connector. Make sure the Accept type is supported

408

Request Timeout Error.

Indicates that API requests have timed out.

Check the target URL/hostname/IP address. These might not be correct or reachable, or might need a tunnel proxy to access.

Check the target network connection or tunnel proxy connection if proxy is used.

415

Unsupported Media Type.

The media-type specified in the Content-type of the request is not supported by the server.

Check the source documentation for the API to find the supported media types.

Check the request header for the connector. Make sure the Content-type is supported

429

Too Many Requests.

Indicates the API requests are too frequent and over the preset limits of the API server.

On the API server, increase the API request limit if possible

Contact Lucidum technical support to modify the connector code with API request throttling

500

Internal Server Error.

Indicates that the API server is not currently accepting requests.

Check that the target URL/hostname/IP address is available. For example, is the server down or in maintenance?

Check the settings on the target API server. Look for settings for rate limits, blacklisting, or other settings that may block the connection.

Check the connector documentation to ensure you entered the correct information.

Check the documentation for the API and check the required format for query fields, body fields, headers, and format.

501

Not Implemented.

This is is related to the HTTP method (GET, POST, PUT, DELETE) you used to request an URL.

Usually, an HTTP request with the wrong method results in a 404 not found status. The Not Implemented” status implies that the method is not supported “yet.” The API creator can use this status to tell the clients that this method will be available to them in future requests.

Check the API version. Are you using an older API version that does not support specific methods?

Contact Lucidum technical support if you need to downgrade/upgrade your API. Lucidum can check make necessary changes to the connector code.

502

Bad Gateway Error.

This error occurs when you use a gateway or proxy server to send requests to the API server. The proxy server then calls the API server in your name. This error indicates that the API server did not send a response.

This could be related to a network problem, or simply because the API server crashed, or was down for maintenance.

Check that the target URL/hostname/IP address is available. For example, is the server down or in maintenance?

Check the settings on the target API server. Look for settings for rate limits, blacklisting, or other settings that may block the connection.

Check target network connection or tunnel proxy connection if proxy is used

503

Service Unavailable.

Indicates a server error. For example, too many API requests were sent and the API server cannot accept more API requests right now.

Check that the target URL/hostname/IP address is available. For example, is the server down or in maintenance?

Check the settings on the target API server. Look for settings for rate limits, blacklisting, or other settings that may block the connection.

On the API server, increase the API request limit if possible

Contact Lucidum technical support to modify the connector code with API request throttling

504

Gateway Timeout Error.

This error occurs when you use a gateway or proxy server to send requests to the API server. The proxy server then calls the API server in your name. This error indicates that the API server did not respond before the request was timed out.

This error can be related to high network latency between the proxy and the API server. It can also mean that that API server is slow and takes too long to process your request.

Check that the target URL/hostname/IP address is available. For example, is the server down or in maintenance?

Check the settings on the target API server. Look for settings for rate limits, blacklisting, or other settings that may block the connection.

Check that network connection for the server and for the tunnel proxy connection

Adding a Connector #

To configure a connector for use with Lucidum:

  1. Navigate to the Lucidum UI.

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

    connectors_ui_updates-1.png

  4. Look for the connector in the Available category.
  5. When you find the connector you want to add, click on its icon.

    connector_settings_5.png

  6. In the Settings page, click the plus-sign icon.

  7. Populate the fields in the Create a New Profile pane. This new profile will be the default profile for the connector.

  8. For details on configuring each type of Connector, see the specific page for that Connector.

Testing a Connector #

While in the Settings page, you can click Save icon (disc) to test a profile.

  • If the profile configuration is correct, Lucidum displays a list of services that are available with the connector. You can click Enable Successful Services.

  • If the profile configuration is not correct, Lucidum displays an error message or the message “Services Not Available”.

To test a profile:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you want to test, click on its icon.

  6. In the Settings page, in the Configured Profiles pane, select the profile you want to test.

  7. Ensure that the connector is enabled.

  8. Click the Save (disc) icon.

  9. If testing is successful, you will see a list of enabled services. You can click Enable All Successful Services or individually select services to use.

Editing a Connector #

To edit the settings in an already configured profile:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you want to edit, click on its icon.

  6. In the Settings page, in the left pane, select the profile you want to edit.

  7. Edit the fields in the right pane.

  8. Click the Save Profile (disc) icon to save your changes.

Adding an Additional Profile to an Existing Connector #

If you want to ingest data from multiple instances of an asset, you can add an additional profile to an already configured connector. To do this:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you to which want to add a profile, click on its icon.

  6. In the Settings page, in the left pane, click Create a New Profile.

  7. In the right pane, in the Create a New Profile pane, enter values in the fields.

  8. Click the Save Profile (disc) icon to save your new profile.

  9. To enable the connector, click the Connection Status icon until it shows the green checkmark.

For details on configuring each type of Connector, see the specific page for that Connector.

Deleting a Profile from an Existing Connector #

To delete a profile from a connector:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you to which want to add a profile, click on its icon.

  6. In the Settings page, in the left pane, find the profile you want to delete and click its Delete (trash can) icon.

Configuring a Connector to Use a Proxy Server #

A proxy server allows Lucidum connectors that run on your SaaS account to fetch data securely from your on-premises assets.

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. In the Settings page, scroll down the field in the right pane. If the connector supports a proxy, it will include the Proxy field.

  6. Enter the following in the Proxy field:

    • 192.168.255.6:3128

    This is the IP address and port number of the proxy service inside the docker container on the proxy server.

For more details on configuring a proxy server, see Configuring a Proxy Server.

Start Ingesting Data with a Connector #

After you have successfully configured a Connector, you can immediately start ingesting data with that Connector. To do this:

NOTE: Lucidum automatically ingests data from all Connectors once a day, at midnight.

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you want to enable, click on its icon.

  6. In the Settings page, in the right pane, click the Connection Status icon until it shows the green checkmark.

  7. Click the Save Profile (disc) icon to save your changes.

Stop Ingesting Data from a Connector #

You can pause or permanently stop ingesting data with an existing Connector. To do this:

  1. Navigate to the Lucidum UI

  2. In the left pane, click the Connectors icon.

  3. In the Connectors page, you can view the list of connectors.

  4. Look for the connector in the Errors, Disabled, or Enabled category. These are connectors that have already been configured.

  5. When you find the connector you want to disable, click on its icon.

  6. In the Settings page, in the right pane, click the Connection Status icon until it shows the red square.

  7. Click the Save Profile (disc) icon to save your changes.

What Data Does the Connector Ingest? #

Lucidum allows you to view details about each active connector:

  • View a list of all assets that include data from an active connector
  • View a list of asset fields ingested by an active connector
  • View a list of all users that include data from an active connector
  • View a list of user fields ingested by an active connector

Lucidum also allows you to view details about how each active connector contributes to an individual asset record or user record:

  • View the list of connectors that contribute to an asset or user record
  • View the fields and values that each connector contributes to an asset record or user record

 

 

What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on September 8, 2025
Connectors FAQs
Table of Contents
  • Profiles
  • Viewing the List of Connectors
  • Viewing Details About the List of Connectors
  • Viewing Details About a Single Connector
  • Error Codes for Connectors
  • Adding a Connector
  • Testing a Connector
  • Editing a Connector
  • Adding an Additional Profile to an Existing Connector
  • Deleting a Profile from an Existing Connector
  • Configuring a Connector to Use a Proxy Server
  • Start Ingesting Data with a Connector
  • Stop Ingesting Data from a Connector
  • What Data Does the Connector Ingest?

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube X-twitter Facebook

@ 2025 Lucidum, Inc. Design By Sandman Studios

SOLUTIONS

COMPANY

RESOURCES

Solutions

  • Modernize Sec Ops
  • Risk & Vulnerability
  • Data Management
  • CISO Tool Kit

COMPANY

  • About Us
  • Testimonials
  • Patents

Resource Library

  • Documentation
  • E-Books
  • White Papers
  • Videos
  • Blogs