Video: How to modify out-of-the-box dashboards

By

The purpose of the JupiterOne Dashboards is to have a centralized set of dashboards that can be used by your security team to view, edit, and share with all teams in your organization in a single, consolidated view.

Jayson Jensen looks at four, key out-of-the-box dashboards that will give you better visibility into your cyber assets. He walks through the dashboards in their default states, and then shows how to modify the dashboards for your particular use case.

Dashboards featured

  1. Vulnerability Reporting
  2. Applications at Risk
  3. User End Points
  4. Development Dashboard

Resources

 

Jayson Jensen
Jayson Jensen

I spent 4+ years doing technical consulting for enterprise clients in the automobile and tax preparation services industries. During this time I gained experience across product, business, and technical domains while performing the functions of a Software Developer, Business Architect, and Product Architect. As a Customer Success Engineer for JupiterOne, I support customers by helping them understand the value of being able to query and visualize the relationships across the security domain which includes cloud infrastructure, network security, endpoint management, identity and access management, vulnerability management, and more. I enjoy everything outdoors, from Spartan races, to scuba diving, to hiking.

To hear more from Jayson, get our newsletter. No spam, just the good stuff once or twice a month. Sign up below.

Keep Reading

What’s new in JupiterOne: Reducing time to value with the new Query Builder (Part 2)
February 6, 2023
Blog
What’s new in JupiterOne: Reducing time to value with the new Query Builder (Part 2)

The new JupiterOne Query Builder streamlines your querying experience by eliminating errors, simplifying query builds, and reducing time to value.

The top 10 questions that every engineering leader should be able to answer
February 2, 2023
Blog
The top 10 questions that every engineering leader should be able to answer

We polled some of our engineering leaders to see what it takes to succeed. In part two, we see if their answers align with the CISOs we talked to.

Identify compromised versions of Github using JupiterOne
January 31, 2023
Blog
Identify compromised versions of GitHub apps using JupiterOne

As a preventative measure, Github will be deprecating the Mac and Windows signing certificates used to sign Desktop app versions 3.0.2-3.1.2 and Atom versions 1.63.0-

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.