This document serves as an introductory guide to the enhanced features and benefits of our new Uptycs Overview Dashboard. The goal is to highlight the value that the new dashboard brings to your organization's security operations.
The Uptycs overview dashboard provides a unified view across all telemetry sources i.e cloud, endpoint, and Kubernetes workloads. The enhanced dashboard offers a powerful asset and resource overview, providing a holistic view of your organization's inventory for efficient management. It highlights top vulnerabilities, threats, malware, secrets, and misconfigurations, thus enabling proactive threat identification and resolution. By streamlining the process, the dashboard allows for easy assignment of responsibilities to address potential security threats.
To access the previously available dashboard that focuses on endpoint security, simply navigate to the left side menu and click on "Overview" under the Endpoint section.
Below the inventory section, you can view threat intelligence data collected from social media sites. This provides real-time information on emerging threats.
The Urgent Vulnerabilities is a list of the top 20 vulnerabilities across your endpoints, prioritized by the highest CVE scores. The widget allows you to quickly access the list of Assigned, Unassigned, Open, and Total vulnerabilities by clicking on the corresponding filters.
From this prioritized list, you have the flexibility to assign vulnerabilities to users, modify due dates, close issues, or adjust scores effortlessly. Clicking on a vulnerability link seamlessly navigates you to the corresponding CVE in Uptycs, ensuring a seamless and streamlined vulnerability management experience.
On the right side of the dashboard, you can easily track the top Trending Vulnerabilities, which are gaining traction in the cybersecurity community. This feature empowers you to identify and mitigate potential risks before they escalate. By clicking on a trending vulnerability link, you can navigate to the CVE database, gaining valuable insights and taking informed actions.
The Threats & Malware widget allows you to quickly access the list of Assigned, Unassigned, Open, and Total threats and malware across your cloud, endpoints, and Kubernetes workloads. The list of the top 20 threats and malware across your assets are prioritized by their severity scores. From the top 20 threats and malware list, you can assign a threat or malware to a user, change the due date, close, or change its score.
On the right, you can also view a list of top Trending Threats and Malware that are gaining traction in the cybersecurity community. This enables you to stay ahead of rising threats and malware, and proactively mitigate potential risks.
The Secrets and Private Keys widget presents a comprehensive list of vulnerable or exposed secrets and private keys across your assets. Prioritized by their severity scores, this list highlights critical security risks within your environment.
Click View All to view the list in a separate tab where you can filter the list, assign to a user, change the due date, close it, or change its score.
The Misconfigurations widget presents a comprehensive list of misconfigurations within your cloud and Kubernetes workloads, emphasizing potential vulnerabilities. Prioritized by their severity score, this list offers a focused view of misconfigurations across your workloads.
Click View All to view the list in a separate tab where you can filter the list, assign it to a user, change the due date, close it, or change its score.