Dashboard
On this page you will find information regarding the Dashboard.
Last updated
On this page you will find information regarding the Dashboard.
Last updated
With the distributed software components Pulsar Agent, Observer, Watchdog and Hacktor, Enginsight lets you collect diverse and in-depth analyses about the security state of your entire IT infrastructure. The dashboard takes on the task of aggregating the analysis data globally to make it immediately accessible. This allows you to see the most important results at a glance and identify where the most urgent need for action is.
You can customize the start and end periods of the statistics displayed according to your preferences. To do this, use the options in the top right-hand corner. There you will also find a button to reset the zoom.
You get an overview of the number of hosts and endpoints you monitor with Enginsight, as well as the Observations performed with the Watchdog. You can also see how many free licenses you have left to monitor additional assets and whether you need to adjust your license quotas soon.
The section informs you about the known vulnerabilities (CVE) on your hosts as well as your endpoints. On the one hand, you get a list of the five applications most frequently affected by CVEs in your IT environment. You should place a special focus on this software and, if necessary, reconsider their patch management.
In addition, Enginsight gives you an evaluation of the trend of the security state of the monitored hosts and endpoints here. We break down the number of vulnerabilities found according to their urgency. The chart not only helps you correctly assess the security state of your IT. It also shows you how effectively your targeted interventions are taking effect.
To easily identify the most vulnerable assets of your IT environments, the risk score helps you. It is calculated using the Common Vulnerability Scoring System (CVSS) and the number of CVEs present.
Graphically represented in the scatterplot, a cloud of dots, you can see in the upper right corner those assets where the most and most urgent work is waiting for you. The further down and to the left an asset is, the fewer (critical) security gaps there are. The scatterplot thus gives you an estimate of the distribution of security gaps.
In addition to the scatterplot, you can also see the assets that are most at risk according to the risk score in the adjacent list.
Here you get a first evaluation of the attacks detected by the analysis of the network traffic. The pie charts give you an overview of the most frequently occurring attacks and the assets most affected by attacks. Check whether you can restrict access to the relevant systems to minimize the attack surface (e.g., close ports, adjust firewall configuration).
You can see from the trend how the attacks develop over time. We differentiate here according to urgency: High, Medium and Low. Pay particular attention to sudden changes. These indicate a security-critical configuration change or even successful infiltration of your IT environment.
For more detailed intrusion detection results, see Hosts → Network Anomalies.
Get the results of the penetration tests you have performed. The dashboard provides you with a pie chart of the most vulnerable target systems according to the risk score. In addition to detected CVE, the other checks of the pentests are also included in the calculation of the risk score.
The display of urgencies shows whether the majority of the checks have been passed (ok), whether safety-critical results are available (low, medium, high, critical) or whether checks could not be performed (error). Here, too, you will also see a chronological progression.
Under 'Activities' you will receive a user log that helps you understand how Enginsight is used by team members. You can use the User Log e.g. as a control instance or for troubleshooting. Use the filters of the search bar to track specific activities.
The user log contains the following actions:
Action | Description |
AUDIT_CREATED | A pentest was performed. |
ALERT_CREATED | A pentest was created. |
ALERT_UPDATED | An Alert was updated. |
ALERT_REMOVED | An Alert was removed. |
APPEASEMENT_CREATED | A user has performed an Appeasement (manual fix) (e.g. configuration, security vulnerability). |
APPEASEMENT_DELETED | A user has deleted an Appeasement (manual fix) (e.g. configuration, security vulnerability). |
ENDPOINT_CREATED | An Endpoint was created. |
ENDPOINT_UPDATED | An Endpoint was updated. |
ENDPOINT_REMOVED | An Endpoint was removed. |
GROUP_CREATED | A group of team members was created. |
GROUP_UPDATED | A group of team members was updated. |
HACKTOR_CREATED | A Hacktor was created. |
HACKTOR_UPDATED | The settings of a hacktor were adjusted or the version was updated. |
HACKTOR_REMOVED | A Hacktor was removed. |
HOST_CREATED | A Host was created. |
HOST_UPDATED | A Host was updated. |
HOST_REMOVED | A Host was removed. |
OBSERVER_CREATED | An Observer was created. |
OBSERVER_UPDATED | The settings of an Observer were adjusted or the version was updated. |
OBSERVER_DELETED | An Observer was deleted. |
PLUGIN_CREATED | A Plugin was created. |
PLUGIN_UPDATED | A Plugin was updated. |
PLUGIN_DELETED | A Plugin was deleted. |
PLUGIN_SCHEDULED_CREATED | The execution of a plugin was scheduled.. |
PLUGIN_SCHEDULED_UPDATED | The scheduled execution of a plugin was updated. |
PLUGIN_SCHEDULED_DELETED | The scheduled execution of a plugin was deleted. |
ROLE_CREATED | A role for users was created. |
ROLE_UPDATED | A role for users was updated. |
ROLE_DELETED | A role for users was deleted. |
TARGETGROUP_CREATED | The target systems for a pentest were defined. |
TARGETGROUP_UPDATED | The target systems for a pentest were updated. |
TARGETGROUP_DELETED | The target systems for a pentest were deleted. |
USER_CREATED | A new User was created. |
USER_UPDATED | The settings of a user have been updated. |
USER_REMOVED | A User was removed |
USER_LOGGED_IN_SUCCESSFULLY | A user has successfully logged in. |
USER_LOGGED_IN_UNSUCCESSFULLY | The login of a user has failed. |
USER_PASSWORD_CHANGED | The password of a user has been changed. |
WATCHDOG_CREATED | A Watchdog was installed. |
WATCHDOG_UPDATED | The settings of a watchdog were adjusted or the version was updated. |
WATCHDOG_REMOVED | A Watchdog was removed. |
WEBHOOK_CREATED | A Webhook was created. |
WEBHOOK_UPDATED | A Webhook was updated. |
WEBHOOK_DELETED | A Webhook was deleted. |