Skip to main content

EASM Dashboard

The EASM Dashboard page provides you with a visual representation of all known assets for your managed companies, along with related vulnerability and scan result data.

The information is presented in clearly defined sections and easily customizable widgets. You can further customize the information presented in the page from the Smart views panel.

EASM_dashboard_page_582223_en.png
  1. The Smart views panel toggle button. This feature allows you to customize, save, and switch between different loadouts of the EASM Dashboard page.

    EASM_dashboard_smart_view_582223_en.png

    For any view in the Custom category, you can click ellipses.PNG to Rename or Delete the view.

  2. The Feedback button. This feature is available while this feature is in early access. Click on the button, fill in the information, and click on Submit.

  3. The View options menu. This section provides you with multiple functions for working with views:

    • Save - Use this option to save changes you make to a saved view.

    • Save as - Save the currently selected filtering rules under a different name.

    • Discard changes: - Revert the asset list to its original state.

    • Refresh - Check for updates related to the displayed list of assets.

    • Full screen - Display the page in full screen mode.

    • Show or hide filters - hide or display the filters menu.

    • Open settings - Displays the Settings panel.

      You can use this panel to customize what widgets are displayed in the dashboard.

  4. Default widgets - This section provides an overview of all known assets and information regarding the last and next scan.

    EASM_dashboard_generalview_582223_en.png
    1. The Filters section. You can use these options to customize the incidents that are displayed in the below grid.

      The following filters are currently available:

      Filtering option

      Details

      Company

      Select a company from the list of all managed companies with valid XDR licenses.

      Only assets originating from the selected company are displayed.

    2. The General scan information widget. This widget displays the date and time of the most recent scan and for the next scheduled one.

      You can use the Scan configuration button to change the current scan schedule.

      Click on Scan now to look for new assets or changes to previously detected ones.

    3. The Total number of assets widget. This widget provides you with a total number of detected assets for your company, organized per asset type:

      • ASN reports - An asset detailing Autonomous System Numbers (ASNs), which represent collections of IP networks managed by one or more network operators.

      • Certificates - Provides information on security certificates found within the network, including details on the issuer, expiration dates, and validity.

      • Domain - Represents a domain of the company that is publicly exposed to the internet.

      • Similar domain - A domain that closely resembles another domain name, and may be used to identify potential typosquatting or phishing domains.

      • DNS record - A record in the Domain Name System (DNS) that maps domain names to various types of data, such as IP addresses, mail servers, or other services.

      • IP block - A range of IP addresses assigned to a network or an organization, often used for routing and identification purposes.

      • IPv4 - An IPv4 address exposed to the internet

      • IPv6 - An IPv6 address exposed to the internet

      • Email - Email addresses used by the company that are are publicly exposed to the internet.

      • Service - A service exposed to the internet.

  5. EASM Widgets - This is a highly customizable section displaying all the widgets currently selected. The following widgets are currently available:

    • Assets recently sent to scan - This widget displays a list of 5 of the assets most recently sent to be scanned.

      Clicking on the Add more assets to next scan link takes you to the EASM Inventory page where you can add more assets to the Scan list.

    • Discovered assets per week - This widget shows a weekly total of newly discovered assets, helping track the growth of your asset inventory over time.

    • Discovered vulnerabilities per week - This widget provides a weekly summary of newly discovered vulnerabilities, offering insights into potential security risks as they emerge.

    • ASN reports - This widget provides a visual representation of discovered autonomous system numbers assets, grouped per location, and displayed on a global map.

      Clicking on any of the groups on the map takes you to the EASM inventory page, using the ASN information smart view.

    • Name servers vulnerable to zone transfers - Displays the total number of name servers identified as vulnerable to zone transfers, highlighting potential security weaknesses.

    • Top vulnerable services - Displays the top services with the most vulnerabilities, allowing you to prioritize remediation efforts for the most at-risk services.

      Clicking on the View all link takes you to the EASM inventory page, using the Services smart view.

    • Top services per protocol - Displays the top services based on their protocol usage, giving an overview of the most commonly used services in your network.

      Clicking on the View all link takes you to the EASM inventory page, using the Services smart view.

    • Certificate expiration - Displays an overview of your Certificate type assets, organized per expiration status:

      • No action needed - Certificates that will expire in more than 30 days

      • Expires soon - Certificates that will expire in 30 days or less.

      • Expired - The number of expired certificates.

      Clicking anywhere on the graph takes you to the EASM inventory page, using the Certificates smart view.

    • DNS records - This widget displays a chart of DNS records, providing insights into the distribution and types of DNS records within your environment.

    • Top critical vulnerabilities - Lists the top potentially critical vulnerabilities to service type assets, aiding in immediate prioritization for remediation.

    • Top open ports - Highlights the most frequently open ports of service type assets, which can be critical for identifying potential security exposures.