Dashboard
Last updated
Last updated
The Dashboard and home page consists of four main sections.
Tab panel control, online EndPoints indicator, account information and general options.
The icon allows the user to modify the tab view in the Dashboard. Selecting it will change it to an arrow , hiding the titles of the Dashboard tabs.
The indicator shows the number of EndPoints that are online. Selecting it will open the "EndPoints Connected" window with details of the Endpoints, as well as a quick check of the Isolation.
Next to the EndPoints quick indicator is the profile picture, email, and role of the logged in user. See Types of Accounts.
The button in the upper left corner reveals two quick actions of the Platform: Edit profile, change the current user's password, and exit the Platform.
Widgets are graphical resources that generally and quickly summarize information about the Emulations that have been carried out and information, artifacts and information related to the Platform.
All widgets, except for Endpoints Locations, can be resized to fit the width of the window. In the upper right corner, there are two buttons:
The blue button corresponds to the standard size.
The purple button corresponds to the maximized size.
Total Emulations
Count of emulations that have been successful, Not Sent, and Failed.
Top 10 Targeted Endpoints
Graphically represents the 10 Endpoints with the most emulations performed along with the count.
Endpoints Locations
It Displays a scalable interactive map that shows where the EndPoints are located around the world. This is often different infrastructures or VPNs that are deployed around the world. It is also possible to see the world in spherical mode, click on .
Most Successful Threats
This are the top five files (Threat Library) that were successfully executed from the attacker's point of view, this information corresponds to the emulations on the Endpoints.
Most Vulnerable Endpoints
Shows the EndPoints in which emulations have been most successful (Attackers Perspective).
Blue: represent the percentage of threats that were able to successfully circumvent their security measures.
Red: represent the percentage of threats that failed security.
Threats Evading Network
This Shows the top five files that were able to evade the network vector successfully from the attacker's point of view.
Percentage Registered Emulations
Displays the total number of artifacts that were not delivered, failed emulations and successful emulations. Represented in percentages and in total quantities.
Online EndPoints
Indicates the details of the EndPoints that are online, such as their Hostname, Private IP Address, Port, and Status.
By selecting the button the user will be redirected to the Endpoints Tab.
Events Timeline
This is the timeline of the actions that were carried out globally on the Platform, which can be:
Loading artifacts, new packages, emulations performed and scheduled, as well as new endpoints registered.