Skyone
English
English
  • Home
  • Skyone Platform
    • Overview
    • Access and Registration
      • Password recovery for the platform
    • Settings and Preferences
      • My Profile
      • User Management
        • How to invite a user to the platform?
        • Options for User Management
        • Types of User Permissions
      • Invitations
      • My Company
      • Support Case Configuration
      • Companies Management
      • Billing
      • Settings
      • Security
      • Feedback
      • Logs
      • Cancellation
      • Partner-Clients
        • My Clients
        • My Partner
    • Notification
    • Health: Platform status check
    • Support Cases
      • How to track and respond to support cases?
      • Guide for opening ABO Tickets
  • Cloud Computer
    • Overview
    • Autosky
      • Login and Password Registration
        • Password RecoveryPassword Registration
      • Profile and Preferences
      • Skyone Autosky Platform
        • Dashboard
        • Accounts
          • Servers
            • Server Options
        • Environments
          • Micro environment
            • Micro environment instance
            • Micro environment servers
          • Scaling environment
            • Scaling environment instances
            • Scaling environment servers
          • Other features of the environments
        • Clients
          • Edit and Clone
          • Users
          • Applications
          • Sessions
          • Manage Access Restrictions
          • Maintenance
            • Maintenance history
        • Users
    • Cloud Server
      • Cloud Server Options
      • Backup Audit
  • Studio
    • Overview
      • Create an account
      • Recover Password
      • Quick Platform Guide
      • How to test the platform for free
      • Workspace
        • Creating a new Workspace
        • Find a Workspace
        • Sending an invitation to a Workspace
        • Editing a Workspace
      • Organizations
        • Creating an Organization
        • Organization Overview
        • Organization Management
        • Organization Monitoring
      • Settings and Preferences
        • Profile
        • Notifications
        • Usage and Billing
        • Users and Permissions
    • Integrations
      • Integration Management
        • Create integration
        • Import Integration
        • Edit Integration
        • Integration Options
        • Flows of this integration
      • Flows
        • Flow management
          • Creating a flow
          • Flow options
          • Flow Canva: configuring and editing the flow
            • Flow Canva: overview
            • Exception Handler
              • Exception Handler - Configuration
              • Exception Handler - Cases
            • Multicontext Flows
              • Example: Multicontext with an API Gateway
              • Example: Multicontext with a Time Trigger
            • Flow Settings
        • Triggers of a flow
          • API Gateway Triggers: Adding and Setting
          • AS2 Triggers: Adding and Setting
          • Queue Triggers: Adding and Setting
          • Flow Triggers: Adding and Setting
          • Time Triggers: Adding and Setting
          • Webhook Triggers: Adding and Setting
        • Tool Modules
          • AS2 Module
          • CSV Module
          • Data Transform Module
          • Data Balancer Module
          • EDI Module
          • Flow Call Module
          • IF Module
          • JavaScript Module
          • Log Module
          • Loop Do While Module
          • Loop For Module
          • Return Module
          • XML Module
          • Other Tool Modules
        • Module Header
        • Connecting components of a flow
        • Editing triggers and modules
        • Data Operations
          • Object Handling
            • Practical example: Handling variables
          • SMOP (Small Operations)
          • Parameterization rules
    • Modules
      • Module management
        • Creating a Module
        • Importing a Module
          • IAC Files - Integration as Code
        • Editing a module
        • Module Options
      • Settings and Operations
        • Module settings
          • Connectivity: Database
          • Connectivity: Email
          • Connectivity: REST
          • Connectivity: SOAP
          • Connectivity: File
          • Connectivity: RFC
          • Connected Account Management
        • Operations
          • Importing operations into REST Modules
          • Operation Management
        • Flows Using This Module
    • API Gateway
    • Terminals & Agent
      • Agent
        • Versions supported by Agent
        • How to Update the Agent Version
        • How to back up Agent files
      • Terminals
    • Data Management
      • Engine
        • How to use the Data Engine Proxy
      • Parameters
      • File filters
      • File templates
      • File Jobs
      • JSONata Jobs
    • Data Lake
    • Data Warehouse
      • Data Jobs
      • Databases
    • Artificial Intelligence
    • How to
      • Insert JSON into databases
      • Flattening: Data transformation using JSONata
      • How to use Form Data
      • Understanding recursion in JSONata
      • REST Module Output Consolidation
      • How to configure a component timeout?
      • Isolated in execution: concept and application in variables
      • URL Parameters in API Gateway
      • Use case: API Gateway trigger parameters
      • Use case: Exception Handler in financial transactions
      • Use case: using Groups to manage access to flows
      • How to create a download endpoint and integrate with Power BI
      • Is it possible to use two triggers in a single flow?
    • FAQ
    • GIGS: The complete guide
    • Glossary
  • Cybersecurity
    • Overview
    • Threat Analysis
      • Security Panel
      • Targets
      • Schedules
      • Target Resolution
      • Threat Group
      • Report
    • How to install Bitdefender security agents
Powered by GitBook
On this page
  • Search and Filters
  • Refresh
  • Threat Panel
  • Threat Analysis: Target Resolution | Active
  1. Cybersecurity
  2. Threat Analysis

Target Resolution

PreviousSchedulesNextThreat Group

Last updated 4 months ago

In "Target Resolution", the user can manage and resolve the threats found during the scans.

Below are the available features:

Schedule Scan

Configure a new scan schedule for the targets. Follow these steps:

  1. Define a name for the schedule.

  2. Set the frequency (One-Time Execution, Daily, Weekly, Monthly, or Annually).

  3. Set the next execution (Date and Time).

  4. Select the targets.

  5. Finally, click "Confirm Scheduling".

Search and Filters

In the upper-right corner of the screen, the following resources are available to help you search for Schedules:

  • Search: Click on the magnifying glass icon to open the search field. Type the name of the threat and press Enter to locate it.

  • Filters: Click on "Filters" to refine the search with the following options:

    • Threat Name: Enter the name of the threat and press Enter to locate it.

    • Threat Type: Select the type (Info, Low, Medium, High, or Critical). By default, the filter is set to "All."

    • Domain: Select the desired domain.

    • Status: Choose between All, Resolved, and Pending.

    • Threats: Choose between Active and Silenced.

You can also filter the Threat Type using the options displayed on the left side of the screen.

After filling out or selecting the filters, simply click "Apply". If you want to remove the filters, click "Clear Filters".

Refresh

The "Refresh" button allows you to check for new changes immediately, without waiting for the next automatic update.

Threat Panel

The top panels show the number of threats by status:

  • Active Threats: Threats that are active and require immediate action.

  • Resolved Threats: Threats that have been resolved and no longer pose risks.

  • Silenced Threats: Threats that have been silenced and are no longer being monitored.

Threat Analysis: Target Resolution | Active

In this section, you can view all the identified threats and direct the necessary actions to manage them. The information is presented with the following details:

  • Status: Indicates the current status of the threat (Resolved or Pending).

  • Threat: Name of the detected threat.

  • Target: Target associated with the threat.

  • Type: Severity level of the threat (Info, Low, Medium, High, or Critical).

  • Created at: Number of days since creation.

  • Fast Actions: Choose one of the following options:

    • Silence by

    • Accept Risks

    • Mark as False Positive

    • Add Mitigation Controls

    • How to solve? Use AI to resolve the target. By clicking this option, our AI will assist in resolving the target.

Snooze Vulnerability

Clicking on one of the last three options in the quick actions will bring up the "Snooze Vulnerability" screen.

Fill in the following fields to silence a target:

  • Reason: Write the reason for silencing the target.

  • Snooze Type: Choose the appropriate justification (Accept Risks, Mitigated, or False Positive).

  • Snooze Period: Select the period for silencing.

After filling in the fields, click "Snooze".