# Platform

{% hint style="info" %}
You are new at Enginsight? Why don't you have a look at the [Start Guide](https://docs.enginsight.com/docs/master/operation/start-guide) first to get a detailed explanation of the basic functions of Enginsight.
{% endhint %}

Here you will find a detailed explanation of the various areas and all functions of the Enginsight platform.

* [**Dashboard**](https://docs.enginsight.com/docs/master/operation/platform/dashboard)\
  Get a first overview of your systems in the dashboard. At [Activities](https://docs.enginsight.com/docs/master/operation/dashboard#activities) you will find the logging of all user actions. In addition, the [Asset Operation Center](https://docs.enginsight.com/docs/master/operation/dashboard#asset-operation-center), the [Partner Operation Center](https://docs.enginsight.com/docs/master/operation/dashboard#partner-operation-center) and the Management View of the [configurations ](https://docs.enginsight.com/docs/master/operation/dashboard#configurations)are located here.
* [**Issues**](https://docs.enginsight.com/docs/master/operation/platform/issues)\
  Get a list of all triggered alerts. You can also define [maintenance periods](https://docs.enginsight.com/docs/master/operation/issues#maintenance-periods) in which no alerts should be triggered.
* [**Hosts (Pulsar-Agent)**](https://docs.enginsight.com/docs/master/operation/platform/legacy/hosts-agent-pulsar)\
  Monitor your servers and clients with the Pulsar-Agent permanently from inside. In addition to the classic monitoring, [intrusion detection](https://docs.enginsight.com/docs/master/operation/platform/legacy/hosts-agent-pulsar/intrusion-detection-system), [software inventory](https://docs.enginsight.com/docs/master/operation/platform/legacy/hosts-agent-pulsar/software-inventory) and [CVE scans](https://docs.enginsight.com/docs/master/operation/legacy/hosts-agent-pulsar/host-details#vulnabilities) are included.
* [**Endpoints (Observer)**](https://docs.enginsight.com/docs/master/operation/platform/endpunkte)\
  Establish a security monitoring of your websites, IP addresses and domains with the Observer. For example, permanently scan for [availability](https://docs.enginsight.com/docs/master/operation/endpunkte/endpoint-details#website), [SSL/TLS](https://docs.enginsight.com/docs/master/operation/endpunkte/endpoint-details#ssltls), [DNS](https://docs.enginsight.com/docs/master/operation/endpunkte/endpoint-details#dns) and [CVE](https://docs.enginsight.com/docs/master/operation/endpunkte/endpoint-details#vulnerabilities).
* [**Observations**](https://docs.enginsight.com/docs/master/operation/platform/observations)\
  Use the Watchdog to perform IP monitoring without rolling out an agent on your devices. Monitor availability with [Ping-](https://docs.enginsight.com/docs/master/operation/observations#ping-monitoring)and [Port](https://docs.enginsight.com/docs/master/operation/observations#port-monitoring)-Checks or monitor network devices via [SNMP](https://docs.enginsight.com/docs/master/operation/observations#snmp).
* [**Shield**](https://docs.enginsight.com/docs/master/operation/platform/shield)\
  Define [manual](https://docs.enginsight.com/docs/master/operation/shield#manual-blocking) and [dynamic](https://docs.enginsight.com/docs/master/operation/shield#dynamic-blocking) rule sets to block network connections. This way, you establish a host-based intrusion prevention system (IPS) and can manage your network traffic.
* [**Penetration Testing**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing)\
  Use the Hacktor to perform fully automated penetration tests on individual assets or your entire IT infrastructure and audit yourself.
* [**Discoveries**](https://docs.enginsight.com/docs/master/operation/platform/discoveries)\
  Permanently scan your entire network with the Watchdog for new assets, take an [inventory](https://docs.enginsight.com/docs/master/operation/discoveries#inventory) of your IT and create an automatic [visualization](https://docs.enginsight.com/docs/master/operation/discoveries#asset-map).
* [**SIEM**](https://docs.enginsight.com/docs/master/operation/platform/siem)\
  With intuitive dashboards and easy-to-use tools, the SIEM gives you a comprehensive view of your entire security posture so you can quickly identify potential threats and take targeted countermeasures.
* [**Alerts**](https://docs.enginsight.com/docs/master/operation/platform/alarme)\
  Set alerts on system events and be notified of anomalies or security incidents.
* [**Settings**](https://docs.enginsight.com/docs/master/operation/platform/einstellungen)\
  Make personal settings. For example, add new team members or manage [user roles](https://docs.enginsight.com/docs/master/operation/einstellungen#roles).

## Cross-plattform functions

* [**Organisations**](https://docs.enginsight.com/docs/master/operation/platform/organisations)\
  Create multiple organisations and access them with a common account.
* [**Tags**](https://docs.enginsight.com/docs/master/operation/platform/tags)\
  Tags can be assigned to all assets across all modules, for example to switch an alert to multiple devices.
* [**Searchbar**](https://docs.enginsight.com/docs/master/operation/platform/searchbar)\
  Wherever data is presented in list form in Enginsight, you will find a search bar to search and filter the information.
