Dashboard

On this page you will find information regarding the Dashboard.

Overview

With the distributed software components Pulsar Agent, Observer, Watchdog and Hacktor, Enginsight lets you collect diverse and in-depth analyses about the security state of your entire IT infrastructure. The dashboard takes on the task of aggregating the analysis data globally to make it immediately accessible. This allows you to see the most important results at a glance and identify where the most urgent need for action is.

You can customize the start and end periods of the statistics displayed according to your preferences. To do this, use the options in the top right-hand corner. There you will also find a button to reset the zoom.

Assets and licenses

You get an overview of the number of hosts and endpoints you monitor with Enginsight, as well as the Observations performed with the Watchdog. You can also see how many free licenses you have left to monitor additional assets and whether you need to adjust your license quotas soon.

The section informs you about the known vulnerabilities (CVE) on your hosts as well as your endpoints. On the one hand, you get a list of the five applications most frequently affected by CVEs in your IT environment. You should place a special focus on this software and, if necessary, reconsider their patch management.

In addition, Enginsight gives you an evaluation of the trend of the security state of the monitored hosts and endpoints here. We break down the number of vulnerabilities found according to their urgency. The chart not only helps you correctly assess the security state of your IT. It also shows you how effectively your targeted interventions are taking effect.

Security vulnerabilities: risk score and scatterplot

To easily identify the most vulnerable assets of your IT environments, the risk score helps you. It is calculated using the Common Vulnerability Scoring System (CVSS) and the number of CVEs present.

Graphically represented in the scatterplot, a cloud of dots, you can see in the upper right corner those assets where the most and most urgent work is waiting for you. The further down and to the left an asset is, the fewer (critical) security gaps there are. The scatterplot thus gives you an estimate of the distribution of security gaps.

In addition to the scatterplot, you can also see the assets that are most at risk according to the risk score in the adjacent list.

Network Anomalies

Here you get a first evaluation of the attacks detected by the analysis of the network traffic. The pie charts give you an overview of the most frequently occurring attacks and the assets most affected by attacks. Check whether you can restrict access to the relevant systems to minimize the attack surface (e.g., close ports, adjust firewall configuration).

You can see from the trend how the attacks develop over time. We differentiate here according to urgency: High, Medium and Low. Pay particular attention to sudden changes. These indicate a security-critical configuration change or even successful infiltration of your IT environment.

For more detailed intrusion detection results, see HostsNetwork Anomalies.

Audits

Get the results of the penetration tests you have performed. The dashboard provides you with a pie chart of the most vulnerable target systems according to the risk score. In addition to detected CVE, the other checks of the pentests are also included in the calculation of the risk score.

The display of urgencies shows whether the majority of the checks have been passed (ok), whether safety-critical results are available (low, medium, high, critical) or whether checks could not be performed (error). Here, too, you will also see a chronological progression.

Activities

Under 'Activities' you will receive a user log that helps you understand how Enginsight is used by team members. You can use the User Log e.g. as a control instance or for troubleshooting. Use the filters of the search bar to track specific activities.

The user log contains the following actions:

Action

Description

AUDIT_CREATED

A pentest was performed.

ALERT_CREATED

A pentest was created.

ALERT_UPDATED

An Alert was updated.

ALERT_REMOVED

An Alert was removed.

APPEASEMENT_CREATED

A user has performed an Appeasement (manual fix) (e.g. configuration, security vulnerability).

APPEASEMENT_DELETED

A user has deleted an Appeasement (manual fix) (e.g. configuration, security vulnerability).

ENDPOINT_CREATED

An Endpoint was created.

ENDPOINT_UPDATED

An Endpoint was updated.

ENDPOINT_REMOVED

An Endpoint was removed.

GROUP_CREATED

A group of team members was created.

GROUP_UPDATED

A group of team members was updated.

HACKTOR_CREATED

A Hacktor was created.

HACKTOR_UPDATED

The settings of a hacktor were adjusted or the version was updated.

HACKTOR_REMOVED

A Hacktor was removed.

HOST_CREATED

A Host was created.

HOST_UPDATED

A Host was updated.

HOST_REMOVED

A Host was removed.

OBSERVER_CREATED

An Observer was created.

OBSERVER_UPDATED

The settings of an Observer were adjusted or the version was updated.

OBSERVER_DELETED

An Observer was deleted.

PLUGIN_CREATED

A Plugin was created.

PLUGIN_UPDATED

A Plugin was updated.

PLUGIN_DELETED

A Plugin was deleted.

PLUGIN_SCHEDULED_CREATED

The execution of a plugin was scheduled..

PLUGIN_SCHEDULED_UPDATED

The scheduled execution of a plugin was updated.

PLUGIN_SCHEDULED_DELETED

The scheduled execution of a plugin was deleted.

ROLE_CREATED

A role for users was created.

ROLE_UPDATED

A role for users was updated.

ROLE_DELETED

A role for users was deleted.

TARGETGROUP_CREATED

The target systems for a pentest were defined.

TARGETGROUP_UPDATED

The target systems for a pentest were updated.

TARGETGROUP_DELETED

The target systems for a pentest were deleted.

USER_CREATED

A new User was created.

USER_UPDATED

The settings of a user have been updated.

USER_REMOVED

A User was removed

USER_LOGGED_IN_SUCCESSFULLY

A user has successfully logged in.

USER_LOGGED_IN_UNSUCCESSFULLY

The login of a user has failed.

USER_PASSWORD_CHANGED

The password of a user has been changed.

WATCHDOG_CREATED

A Watchdog was installed.

WATCHDOG_UPDATED

The settings of a watchdog were adjusted or the version was updated.

WATCHDOG_REMOVED

A Watchdog was removed.

WEBHOOK_CREATED

A Webhook was created.

WEBHOOK_UPDATED

A Webhook was updated.

WEBHOOK_DELETED

A Webhook was deleted.

Last updated