User Responsibility A “How To” Guide for SecurityCenter.

Slides:



Advertisements
Similar presentations
From Words to Meaning to Insight
Advertisements

Support.ebsco.com Grouping Databases by Subject in EBSCOadmin Tutorial.
Support.ebsco.com Creating Profiles in EBSCOadmin Tutorial.
3D Tool Examples Dave Breslin Tenable Discussions Forum)
Initial set-up and use of OAS for Administrators/Coordinators.
Tutorial EBSCOadmin User Groups support.ebsco.com.
Breaking Kill Chains A “How To” Guide for SecurityCenter.
Practice Insight Instructional Webinar Series Reporting
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
Templates and Styles Excel Advanced. Templates are pre- designed and formatted spreadsheets –They provide consistency of layout/structure –They.
HTML Composer Scott Wanner Technical Account Manager, Dallas Copyright 2007, Information Builders. Slide 1.
SecurityCenter Reporting Nessus Scan Report. SecurityCenter Reports For customers who use Nessus for vulnerability scanning and then move to SecurityCenter,
Jewelry Inventory Management Software Your Logo Here Welcome to a demonstration of Del Mar Data Systems Jewelry Inventory Management.
Creating User Profiles in EBSCOadmin Tutorial support.ebsco.com.
1 NetInsight Hands-On 10 October 2007
6 th Annual Focus Users’ Conference Custom Reports and Dashboards Presented by: Mike Morris.
End of Year Report SecurityCenter. End of Year Report Topics Covered o How to install the End of Year report template o How to modify the report template.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Finding Exploitable Admin Systems A “How To” Guide for SecurityCenter.
6 th Annual Focus Users’ Conference Application Editor and Form Builder Presented by: Mike Morris.
Vulnerability Types And How to Use Them.
Using Iterators in Reports
Practice Insight Instructional Webinar Series Reporting
Quick Start Guide: Filters Advanced Learn about: 1.What filters are and their functionality 2.How to create a filter using Samples, Equipment & Labels.
CapitalEsourcing System Guidance for Suppliers Managing your organisation’s profile
Malware Hunter How To Guide for SecurityCenter Continuous View™
Adxstudio Portals Training
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
Self Guided Tour for Query V8.4 Basic Features. 2 This Self Guided Tour is meant as a review only for Query V8.4 Basic Features and not as a substitute.
Integrating and managing your Engaging Networks data Top ten data features.
Using Assets with Dashboards A Guide. About this Guide This guide shows how to create, export, and load a dashboard that requires an asset This guide.
242/102/49 0/51/59 181/172/166 Primary colors 248/152/29 PMS 172 PMS 137 PMS 546 PMS /206/ /227/ /129/123 Secondary colors 114/181/204.
1 NetInsight Demonstration 10 October 2007
Dashboard: has been completely overhauled – View your completion status, number of total records, and the latest Crop Monitor at a glance – Help files.
S9k Production Floor System Ingredient Inventory Production Inventory Production Dashboard.
Reports and Learning Resources Module 5 1. SLMS Primary Administrator Training Module 5: Reports and Learning Resources 2.
Timothy S. Brophy Director of Institutional Assessment.
Quick Start Guide: Filters Learn about: 1.What filters Are & Their Functionality 2.How to Create A Filter.
© 2010 Blackboard Inc. All rights reserved. Blackboard Learn 9.1 Keeping Students on Track.
Searches and Search Results 1 CONFIDENTIAL - LPS Real Estate Group Client Use Only.
Building Dashboards SharePoint and Business Intelligence.
Labcheck Next Generation Quick Start Guide Filters.
INTRODUCTORY GUIDE TO SURPLUS LINE INFORMATION PORTAL 2.0 (SLIP) CALIFORNIA’S ELECTRONIC FILING SYSTEM THE SURPLUS LINE ASSOCIATION OF CALIFORNIA Quick.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
23 Copyright © 2009, Oracle. All rights reserved. Oracle Business Intelligence Answers: Advanced Features.
Using Find / Update in SecurityCenter Reports A “How To” Guide for SecurityCenter.
CPSC 203 Introduction to Computers T97 By Jie (Jeff) Gao.
Forms Manager. What is Forms Manager? Forms Manager is a completely new online form creation and form data management tool.
Adxstudio Portals Training
22 Copyright © 2009, Oracle. All rights reserved. Filtering Requests in Oracle Business Intelligence Answers.
REEferralNet Person-to-Person Relationship Management Tool. Go to: Did you know 92% trust referrals from people they know And are.
Integrating Components and Dynamic Text Boxes with the Animated Map– Lesson 101 Integrating Components and Dynamic Text Boxes with the Animated Map Lesson.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM CONSOLE.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Control Center – IQ Networking Overview
Overview – SOE PatchTT November 2015.
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Overview – SOE PatchTT December 2013.
LMEvents SharePoint Portal How-to Guide
Welcome to the JCISD Teacher Website Training Guide
Easy methods to control your RSS Feeds Footer in WordPress Guided By: wpglobalsupportwpglobalsupport.
IIS.
Practice Insight Instructional Webinar Series Reporting
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Lesson Nine: Epic Appointment Scheduling Referrals Reports
Basic Reports.
Presentation transcript:

User Responsibility A “How To” Guide for SecurityCenter

User Responsibility Feature Often in an IT environment, it can be unclear who is responsible for managing and patching certain systems on the network SecurityCenter 4.8 and later supports grouping systems into assets and assigning Users to be responsible for those assets

User Responsibility Feature User Responsibility featureThis guide explains how to set up and use SecurityCenter’s User Responsibility feature to assist in tracking User responsibilities and understanding how well vulnerabilities on network systems are being managed

User Responsibility Feature Procedure: 1. Add or create assets 2. Assign Users to be responsible for assets 3. Use dashboards and reports to track User responsibilities and vulnerability management

Add Assets To add an asset from the SecurityCenter app store feed, within SecurityCenter select Support > Assets Click the “Add” button Select the desired asset and click “Add It Now”; Repeat to add more assets Click the “Finished” button

Create Assets For User responsibility, an organization will likely want to create custom groupings of systems via Static or LDAP Query assets To create a custom asset, within SecurityCenter select Support > Assets Click the “Add” button Click “Create Custom Asset” Set the asset Type, Name, and system information Click the “Submit” button

Assign User Responsibility A SecurityCenter User can be assigned responsibility for an asset when the User is created, or by editing the User

Assign User Responsibility Assign the asset for which the User is responsible on the “Access” tab o Can only assign a single asset, but that asset can be any type, including a combination asset of multiple other assets o “All Available Ranges” assigns responsibility for all systems the User can see, i.e., everything in the defined ranges of the User’s Group

User Responsibility Dashboard The User Responsibility dashboard will assist in tracking User responsibilities and understanding how well vulnerabilities are being managed o This dashboard can be located in the SecurityCenter feed by selecting category Monitoring and then selecting tag user responsibility

User Responsibility Dashboard User Responsibility SummaryDashboard makes use of the User Responsibility Summary tool, which displays Users and the vulnerability info of the asset for which each User is responsible Note: If multiple Users are responsible for the same asset, the Users will be displayed in a list in the Users field in the output

User Responsibility Dashboard Scanned Hosts Per UserScanned Hosts Per User component makes use of the User Responsibility tool and filters on Plugin (Nessus Scan Information) Plugin returns one result for each scanned host, enabling this component to display a count of scanned hosts for which each User is responsible

User Responsibility Dashboard Scanned Hosts Per User – To drill down to obtain information on the specific systems for which a User is responsible: 1. Click on the Browse Component Data button 2. Click on the desired User (For Flash interface, click in the Total or Vulnerabilities column for the User) 3. Change tool from Vulnerability Summary to IP Summary Flash HTML 5

User Responsibility Dashboard Exploitable Vulnerabilities Per UserExploitable Vulnerabilities Per User component makes use of the User Responsibility tool and filters vulnerabilities with an Exploit Available This component displays the count of exploitable vulnerabilities on all systems for which each User is responsible

User Responsibility Dashboard Exploitable Vulnerabilities Per User – To drill down to obtain detailed vulnerability information on the systems for which a User is responsible: 1. Click on the Browse Component Data button 2. Click on the desired User (For Flash interface, click in the Total or Vulnerabilities column for the User) 3. If desired, change tool to Detailed Vulnerability List; to obtain remediations, change tool to Remediation Summary Flash HTML 5

User Responsibility Dashboard Patches Available >30 Days Per UserPatches Available >30 Days Per User component makes use of the User Responsibility tool and filters vulnerabilities that had a Patch Published more than 30 days ago This component displays the count of patches that have been available for more than 30 days for vulnerabilities on all systems for which each User is responsible

Network Mapping Report makes use of the User Responsibility tool within an IP iterator to show the User(s) responsible for each hostNetwork Mapping Report In a Report Display User(s) responsible for host Iterate over IPs

Customization by User Responsibility Responsible UsersAny vulnerability-based dashboard or dashboard component can be customized for specific responsible User(s) by using the Responsible Users filter option Note: Multiple Users can be selected

User Responsibility SecurityCenter 4.8 and later supports grouping systems into assets and assigning users to be responsible for those assets User Responsibility featureUsing dashboards and reports based on the User Responsibility feature will assist an organization in tracking User responsibilities and understanding how well vulnerabilities on network systems are being managed

For Questions Contact Tenable Customer Support Portal