Trust Sight Introduction
  • 11 Oct 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

Trust Sight Introduction

  • Dark
    Light
  • PDF

Article summary

About this Article
This article provides an introduction to Trust Sight


Trust Sight provides visibility into the topology, vulnerability compensation, system integrity and software information of the customer environment. These widgets can be viewed at macro and micro levels to get a clear understanding of the existing environment. With this information, required actions can be taken to compensate the discovered security gaps.


Workflow

Here is the workflow for Trust Sight at a high level:

TrustSight_Workflow

  1. Trust Guardian components (CMS and Probe) are installed. The Applications/Workloads are provisioned. Host Protection is enabled for an initial scan of all the executables on the Probe machine
  2. Configuration:
    1. Topology Nodes can be added/modified as required. Upload it in JSON format. Click here for more information
    2. Vulnerability scan is initiated in the customer infrastructure and the results are uploaded. Click here for more information
  3. After completion of Step 1 and 2, Trust Sight provides the statistics of the procured/discovered information

Features

To access Trust Sight, navigate to Trust Sight in the CMS left navigation pane. There are four basic widgets provided by Trust Sight to understand the current pulse of the environment:

  1. Topology
  2. System Integrity
  3. Vulnerability Compensation
  4. Know Your Software

Was this article helpful?

What's Next