ASM-VP DASHBOARD

{{ csrf_field() }}
@if(\App\Models\SplunkDashboards::getDocuments('ASM-VP')) Manual @endif
@php $widget=$splunk_searches::findOrNew(603); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([603],$from,$to) !!}
@endcan

Protection for Endpoints

@can('view-widget',[$widget->getServicesIdArray()])

Agents active

@endcan
@php $widget=$splunk_searches::findOrNew(650); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([650],$from,$to) !!}
@endcan

Testing for Network Vulnerabilities on MSS-IOT

@can('view-widget',[$widget->getServicesIdArray()])

Critical

High

Medium

Low

@endcan
@php $widget=$splunk_searches::findOrNew(604); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([604],$from,$to) !!}
@endcan

Testing for Asset Discovery

@can('view-widget',[$widget->getServicesIdArray()])
0

Total Hosts Discovered

0

Baselined Hosts

@endcan
@php $widget=$splunk_searches::findOrNew(616); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([616],$from,$to) !!}
@endcan

Exploitation of vulnerabilities – continuous Web Application Pentest

@can('view-widget',[$widget->getServicesIdArray()])
0

Cases of this type

@endcan

Testing for open ports

@if(Gate::check('view-service','MSS-VME-ADV') or Gate::check('view-service','MSS-VME')) {{ $asmvpData['open ports']??'n/a' }} Cases opened @endif
@php $widget=$splunk_searches::findOrNew(613); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([613],$from,$to) !!}
@endcan

Testing for gaps in controls

@can('view-widget',[$widget->getServicesIdArray()])
@can('view-service','MSS-BAS Email') Email Gateway Score @else

Email Gateway Score

@endcan
@can('view-service','MSS-BAS-EDR') EDR Score @else

EDR Score

@endcan{{-- no dashboard --}}
@can('view-service','MSS-BAS-WEB') Web Gateway Score @else

Web Gateway Score

@endcan
@can('view-service','MSS-BAS-IMTHREAT') Immediate Threats Score @else

Immediate Threats Score

@endcan
@can('view-service','MSS-BAS-DLP') DLP Score @else

DLP Score

@endcan
@can('view-service','MSS-BAS-LM') Hopper Score @else

Hopper Score

@endcan
@endcan
@php $widget=$splunk_searches::findOrNew(614); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([614],$from,$to) !!}
@endcan

Testing for Configuration Management GAPS

@can('view-widget',[$widget->getServicesIdArray()])

Devices connected

@endcan
@php $widget=$splunk_searches::findOrNew(605); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([605],$from,$to) !!}
@endcan

Testing for Network Vulnerabilities

@can('view-widget',[$widget->getServicesIdArray()])

Critical

High

Medium

Low

@endcan
@php $widget=$splunk_searches::findOrNew(606); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([606],$from,$to) !!}
@endcan

Testing for Application Vulnerabilities

@can('view-widget',[$widget->getServicesIdArray()])
0

Critical

0

High

0

Medium

0

Low

@endcan
@php $widget=$splunk_searches::findOrNew(607); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([607],$from,$to) !!}
@endcan

Testing for Missing Patches

@can('view-widget',[$widget->getServicesIdArray()])

Missing patches

@endcan

Testing for Exploitability of immediate threats

@can('view-service','MSS-BAS-IMTHREAT') {{ $asmvpData['missing patches']??'n/a' }}

Systems can be compromised from this Immediate threat

@endcan

Detection and Correlation

{{ $asmvpData['Detection and Correlation']??'n/a' }} Cases opened

Verification and Prioritization

{{ $asmvpData['Verification and Prioritization']??'n/a' }} Cases opened

Remediation Plan

{{ $asmvpData['Remediation Plan']??'n/a' }} Cases opened
@php $widget=$splunk_searches::findOrNew(608); @endphp
@can('view-widget',[$widget->getServicesIdArray()])
{!! $splunk_searches::getCodeArray([608],$from,$to) !!}
@endcan

Patch Management Execution and Change Management

@can('view-widget',[$widget->getServicesIdArray()])

Devices connected

@endcan

Incident Response

{{ $asmvpData['Incident Response']??'n/a' }} Cases opened

Configuration Execution and Change Management

@can('view-service','MSS-EPCM')
{{ $asmvpData['conf exec']??'n/a' }} Cases opened
@endcan

AVG TIME

{{ $asmvpData['resolve'] }}

Resolve

{{ $asmvpData['respond'] }}

Respond