From your PasswordIQ dashboard, you can run scans, set up a scan schedule, and view your scan results. You can also create custom dashboards to organize your scan data based on your organization's needs.
See the sections below to learn how to run scans, create custom dashboards, and view your results from each type of widget. For general information about PasswordIQ, see our PasswordIQ Product Manual.
Running Scans
You can run scans and create scan schedules from your PasswordIQ dashboard. We recommend that you create a scan schedule instead of running individual scans so that you can continually monitor your organization's data.
To learn how to run scans and create scan schedules from your dashboard, see the subsections below.
Running Individual Scans
If you would like to receive data between scheduled scans, you can run an individual scan. For example, if your scan schedule runs every Monday and Friday and you prompt your users to resolve their password vulnerabilities on Tuesday, you could run an individual scan on Wednesday. With this individual scan, you could verify that the password vulnerabilities were resolved between scheduled scans.
To run an individual scan from your dashboard, follow the steps below:
- Log in to your KSAT account.
- Navigate to the PasswordIQ tab. When you select this tab, you'll be taken to your dashboard.
- In the top-right corner of the page, click the Scan Now button. When your scan completes, the time and date will display in the Last Scan bar at the top of the page.
Creating a Scan Schedule
From your dashboard, you can also create a scan schedule that initiates scans from your PasswordIQ client. The scan schedule will run weekly. Depending on your organization's needs, you can run a scan up to seven times per week.
To create a scan schedule from your dashboard, follow the steps below:
- Log in to your KSAT account.
- Navigate to the PasswordIQ tab. When you select this tab, you'll be taken to your dashboard.
- In the top-right corner of the page, click the calendar icon.
- In the Schedule Recurring Scan window, click the Add Schedule button.
- Under Repeats on Day(s) of the Week, select the days that you would like to run scans.
- Under Starts At, select the time that you would like to run scans. This time will apply to all of the days of the week that are selected.
- Click the Save Schedule button.
Creating Custom Dashboards
In addition to using the default dashboard, you can also create your own custom dashboards. On each dashboard, you can add and customize five different types of widgets. Depending on which widget you select, you can filter the widget data by date range, group, and vulnerability type.
To create a custom dashboard and customize your widgets, follow the steps below:
- Log in to your KSAT account.
- Navigate to the PasswordIQ tab. When you select this tab, you'll be taken to your dashboard.
- In the top-right corner of the page, click the New Dashboard button.
- From the blue bar at the top of the page, select the type of widget that you would like to add.
- In the top-right corner of the widget, click the gear icon.
- In the Customize Widget pop-up window, customize the widget by filling out the fields. For more information, see the screenshot and list below:
- Name: Enter a name for the widget. If you have multiple versions of the same widget, you can use the name to differentiate between the widgets.
-
Vulnerability Type: Select the type of vulnerability that the widget will display data for. For example, if you select the Shared Password vulnerability, the widget will only display data for that vulnerability.
Note:By default, all widgets except for the User Table widget will display data for the Weak Password vulnerability. If you would like to view data for other vulnerabilities, you'll need to change the Vulnerability Type each time you add a widget.
- Groups: Select the KSAT groups that the widget will display data for. For example, if you are customizing a widget and you select "Group 1" and "Group 2" for the Group filter, the widget will only display data for those two groups.
- Date Range: Select the date range that the widget will display data for. For example, you can select the Last 6 Months option to view data for the last six months.
- Click the Save button.
- Repeat step 4 through step 7 until all of the widgets that you would like to display are on your dashboard.
- In the top-right corner of the page, click the Save Changes button to save your custom dashboard.
Viewing Scan Results
Each time the PasswordIQ client scans your Active Directory, your dashboard will automatically update with your scan results. You can view information about your scan results by using the widgets on your default or custom dashboards.
When you create custom dashboards, you can customize five types of widgets. To learn how to create a custom dashboard, see the Creating a Custom Dashboard section above.
To learn about the data that each widget displays, see the subsections below.
User Count
The User Count widget displays the number of users who were detected to have a vulnerability. If you would like to view data for multiple vulnerabilities, you can add a version of this widget for each vulnerability.
Pie Chart
The Pie Chart widget displays the percentage of users who were detected to have a vulnerability. You can hover over the two sections of the widget to view the user count for users who were detected to have the vulnerability and users who were not detected to have the vulnerability.
Status Changes
The Status Changes widget shows the progress of your organization's new vulnerabilities and resolved vulnerabilities over time. You can monitor this graph to determine whether your organization's overall password security is improving.
For details about the two lines on this graph, see the list below:
- The New Vulnerabilities Over Time line represents new vulnerability detections over time. This line shows the number of users whose statuses changed from not detected to detected for a vulnerability. You can monitor this line to assess whether your users are creating passwords with new vulnerabilities.
- The Resolved Vulnerabilities Over Time line represents resolved vulnerability detections over time. This line shows the number of users whose statuses changed from detected to not detected for a vulnerability. You can monitor this line to assess whether your users are resolving their password vulnerabilities after vulnerabilities are detected.
Over Time
The Over Time widget shows the progress of your organization's total vulnerabilities over time. You can monitor this graph to determine whether the PasswordIQ client is detecting more vulnerabilities or fewer vulnerabilities over time. If your organization's password security is improving, the total vulnerabilities will decrease over time.
Vulnerabilities
The Vulnerabilities widget contains User Count widgets for each vulnerability and a Pie Chart widget. When you select the User Count widget for a vulnerability, the Pie Chart widget will display data for that vulnerability. For example, if you select the User Count widget for the Shared Password vulnerability, the Pie Chart widget will display data for the Shared Password vulnerability.
User Table
The User Table widget displays information about the users who were detected to have one or more vulnerabilities. You can use this widget to identify which users need help with improving their password security. In this table, you can also change the status of a vulnerability when it is reviewed or resolved.
To learn how to use the User Table widget, see the screenshot and list below:
- Vulnerabilities by User Menu: Select a vulnerability to display all users that were detected to have the vulnerability. You can also click All Vulnerabilities to view scan results for all vulnerabilities.
- Search: Search for a user by entering their name or email address.
- Type: Click this drop-down menu to filter by user group. By default, All Users will be selected.
- Download CSV: Click this button to download a CSV file that contains your scan results. You can use CSV files to keep records of your scans.
- Email Address: View the email addresses of the users that were detected to have one or more vulnerabilities.
- Vulnerability Type: View the types of vulnerabilities that were detected for each user.
-
Vulnerability Status: View the status of each vulnerability to determine whether the vulnerability has been reviewed or resolved. To change the Vulnerability Status, click the Edit button and update the status.
Note:The vulnerability status doesn't update automatically. You or another administrator will need to update the status after each scan.
- Detected On: View the time and date when each vulnerability was detected.
- Notes: View the notes that have been entered for each vulnerability detection. To add notes to a detection, click the Edit button and enter a note.
- Edit: Click this button to change the Vulnerability Status or add notes to the Notes field.