FSProtect
  • Introduction
    • FSProtect - Active Directory Security Assessment
    • Glossary
    • Architecture
    • Requirements
    • Installation
    • Update
  • Scans
    • New Scan
    • Scans
    • Policies
  • Dashboard
  • Trend Insights
  • Issues
  • Impacts
  • Attack Surface
    • Forests
    • Domains
    • Computers
    • Users
    • Groups
    • GPOs
    • OUs
    • MSAs
    • GMSAs
    • Local Users
    • Local Groups
    • Certificate Authorities
    • Certificate Templates
    • CA Certificates
  • GPO Audit
    • GPO Comparison
    • RSoP Comparison
    • Custom Baselines
  • Integrations
    • CyberArk
    • Mail
    • Jira
  • Search & Reports
    • Domain
    • Computer
    • User
    • Group
    • GPO
    • OU
    • ManagedServiceAccount
    • GroupManagedServiceAccount
    • LocalUser
    • LocalGroup
    • CertificateAuthority
    • CertificateTemplate
    • CACertificate
    • SPN
    • SmbShare
  • Health Check
  • Visualize
  • Settings
    • User Settings
    • LDAP Authentication Settings
    • Roles and Permissions
    • Token Expiration Settings
  • Share Audit
    • Summary
    • Secrets
    • Settings
Powered by GitBook
On this page
  • Risk Score
  • Exposure Score
  • Dangerous Path Count
  • Vulnerabilities by Severity
  • Affected Entity and Total Affected Entity Count
  • Risky Stealth Admin and Risky Admin Count
  • Asset Stats
  • Risky Asset Stats
  • Risk Score By Top 5 Tags
  • Risk Score By Top 5 Impacts
  • Share Audit Secret Count

Was this helpful?

Trend Insights

PreviousDashboardNextIssues

Last updated 6 months ago

Was this helpful?

Trend Insights provides various charts and statistics offering a comprehensive overview of the system's risk and security status, including the ability to filter data by policy and select specific date ranges for a more detailed analysis.

Risk Score

The Risk Score graph indicates the overall risk level of the Active Directory environment based on scan results, helping to assess and monitor security risks over time.

Exposure Score

The Exposure Score graph reflects the level of exposure in the Active Directory environment based on scan findings. It provides insights into potential vulnerabilities and tracks changes in exposure over time.

Dangerous Path Count

The Dangerous Path Count displays the number of risky access paths identified within the Active Directory environment, highlighting potential pathways that attackers could exploit to access sensitive assets.

Vulnerabilities by Severity

The Vulnerabilities by Severity graph categorizes and tracks vulnerabilities based on severity levels (Critical, High, Medium, Low, and Informational) over time. This visualization helps monitor changes in the severity of vulnerabilities across assessments, providing insights into the effectiveness of security measures and identifying areas that may need more attention.

Critical: The number of Issues with Critical severity.

High: The number of Issues with High severity.

Medium: The number of Issues with Medium severity.

Low: The number of Issues with Low severity.

Info: The number of Issues with Info severity.

Affected Entity and Total Affected Entity Count

The Affected Entity and Total Affected Entity Count graph shows the number of entities impacted at each severity level (Critical, High, Medium, Low, and Informational) across different assessments. This provides a clear view of affected entities over time, helping to measure the impact and effectiveness of remediation efforts in the Active Directory environment.

Statistic

Description

Critical Affected

The number of entities affected at a critical level, showing high risk and requiring immediate action.

High Affected

The number of entities affected at a high risk level.

Medium Affected

The number of entities affected at a medium risk level.

Low Affected

The number of entities affected at a low risk level.

Info Affected

The number of entities affected with informational level issues, typically minor or non-critical.

Total Affected

The total number of affected entities across all risk levels.

Risky Stealth Admin and Risky Admin Count

The Risky Stealth Admin and Risky Admin Count graph shows trends in the number of high-risk admin accounts over time. It helps track changes in privileged account risks across assessments, aiding in monitoring the impact of security actions.

Asset Stats

The Asset Stats graph displays trends in key object types over time, including Admin, Privileged, Local Admin, and Stealth Objects within the Active Directory environment. This helps track changes in the number and distribution of these high-priority assets across assessments, providing insights into shifts in administrative and privileged object management.

Statistic

Description

Admin Object

The number of administrative objects (e.g., accounts with admin privileges) that may carry security risks.

Privileged Object

The number of objects with elevated permissions that could pose a risk if compromised.

Local Admin Object

The number of objects with local administrative rights.

Stealth Object

The number of hidden or unusual objects that could be considered high-risk.

Risky Asset Stats

The Risky Asset Stats chart shows changes in asset types with elevated risk across multiple assessments. It tracks the count and percentage changes in Admin Objects, Privileged Objects, Local Admin Objects, and Stealth Objects, helping to monitor trends and shifts in asset risks over time.

Statistic

Description

Risky Admin Object

The number of high-risk admin objects, indicating potential vulnerabilities within admin accounts.

Risky Privileged Object

The number of privileged objects identified as high risk, possibly due to elevated access permissions.

Risky Local Admin Object

The number of high-risk local admin objects, showing potential risks within local administrative access.

Risky Object

The total number of objects considered high risk, encompassing a broader set of risky entities.

Risk Score By Top 5 Tags

The Risk Score By Top 5 Tags graph shows changes in risk levels across the top five categories in the Active Directory environment, including Account Security, Endpoint Security, ADCS Security, Certificate Template Security, and ACL. It helps track trends in these specific risk areas over time.

Tag

Description

Privilege Management

The risk score related to managing access permissions and controls.

ACL

The risk score associated with Access Control Lists, indicating how access permissions are configured.

Anomaly

The risk score related to unusual or unexpected activities, signaling possible anomalies in the system.

Kerberos Security

The risk score concerning Kerberos authentication, reflecting its security level.

Account Security

The risk score linked to account security concerns, including password and access vulnerabilities.

Risk Score By Top 5 Impacts

The Risk Score By Top 5 Impacts graph tracks risk trends for the top five potential impacts, such as Credential Theft Attacks, NTLM Relay, Unconstrained Delegation Exploitation, Privilege Escalation with Certificate Template Abuse, and Privilege Escalation with Certificate Authority Abuse. This visualization helps monitor changes in these high-risk impact areas across assessments.

Impact Type

Description

ACL Based Attack Path Exploitation

The risk score for exploitations through access control lists (ACLs).

Resource Based Constrained Delegation Exploitation

The risk score related to exploiting delegated resource access.

Persistence with SID-History Injection

The risk score from SID-history injection techniques.

Persistence with Access Control Entries

The risk from persistence through access control entries.

Credential Theft Attacks

The risk score related to credential theft.

Share Audit Secret Count

The Share Audit Secret Count metric displays the number of shared audit secrets identified within the Active Directory environment. It provides insight into the potential risks associated with shared credentials and access permissions.

Trend Insights
Risk Score
Exposure Score
Dangerous Path Count
Vulnerabilities by Severity
Affected Entity and Total Affected Entity Count
Risky Stealth Admin and Risky Admin Count
Asset Stats
Risky Asset Stats
Risk Score By Top 5 Tags
Risk Score By Top 5 Impacts
Share Audit Secret Count