Use Cases for Dashboards
After Lucidum has ingested data, you can view dashboards and charts in the Dashboards page. These dashboards and charts provide insights into your environment.
This chapter will show some common use cases for dashboards.
For more use cases and dashboards, see the manual on Use Cases (https://docs.lucidum.io/lucidum-help-center/latest/public/use-cases).
All Assets and All Users
Lucidum finds uses connected data sources and machine learning to find all devices, all users, all data and correlates them.
This dashboard provides an overview of the assets and users in your environment. You can drill down in this dashboard to see details about assets and users.

This dashboard displays:
All assets by type
List of all servers and VMs
List of all workstations
List of mobile devices
List of containers and microservices
All assets by data source
All users by department
All users by location
All users by manager
You can click on any chart to drill down for more information.
Assets Not Managed in Active Directory or LDAP
This dashboard displays assets that have been found by Lucidum yet are not managed by Active Directory. In this dashboard, assets that are not in Active Directory are considered “unknown”.

The dashboard displays:
Count of all unknown assets.
Unknown assets and their known risks
Unknown assets without endpoint protection
Unknown assets with critical vulnerabilities
Unknown assets with high vulnerabilities
Unknown assets with critical CVEs
Unknown assets and the services that are listening on those assets
Unknown assets that are accessing files in the environment
Unknown workstations without VPN
Unknown assets by type
Unknown assets by department
You can click on any chart to drill down for more information..
Assets without an Endpoint Agent
Here is a dashboard for a customer who uses Crowdstrike Falcon for endpoint management and security. This dashboard shows all assets where Crowdstrike Falcon is not installed.

The dashboard includes charts for:
Assets without Crowdstrike by function (endpoint or network)
Assets without Crowdstrike by type (server, workstations, firewall, etc.)
Workstations without Crowdstrike
Assets without Crowdstrike by department
Assets without Crowdstrike by operating system
You can click on any chart to drill down for more information.
Assets without Encryption
Here is a dashboard about all assets with unencrypted data storage. This is especially useful for organizations working on SOC-2 compliance.

The dashboard includes charts for:
Unencrypted assets by type
Encrypted assets by type
Unencrypted assets by location
Unencrypted assets by manager
Users whose assets are not encrypted
You can click on any chart to drill down for more information.
Assets with End-of-Life Operating Systems
This dashboard displays information about assets running operating systems that are no longer supported by the operating system vendor. Therefore, the vendor no longer releases security patches for these operating systems.

This dashboard includes charts for:
All Windows assets, sorted by OS version
Windows assets using EOL operating systems
All Macintosh assets, sorted by OS version
Macintosh assets using EOL operating systems
Windows assets using EOL operating systems, by owner
Windows assets using EOL operating systems, by manager
Windows assets using EOL operating systems, by owner
Windows assets using EOL operating systems, by manager
Macintosh assets using EOL operating systems, by owner
Macintosh assets using EOL operating systems, by manager
You can click on any chart to drill down for more information.
Disabled Users (Zombies)
Here’s a dashboard about users who have been disabled in Active Directory but still appear active in the environment. These accounts are known as zombie accounts and create a security risk.

This dashboard includes charts for:
All users who have been disabled in Active Directory
All users who have been disabled in Active Directory yet have been seen in the environment in the last 5 days
All users who have been disabled in Active Directory yet have accessed files in the environment in the last 5 days
All users who have been disabled yet have logged in to the VPN in the last 5 days
All users who have been disabled in Active Directory and whose accounts allow access to secure assets
All users who have been disabled yet have logged in to the VPN in the last 5 days and whose accounts have access to secure assets
You can click on any chart to drill down for more information.
Viewing Details in a Chart
You can click on a chart and get details about the data in the chart.
For example, suppose a dashboard includes this chart:
Clicking on the slice “Value not exist” drills down and provides more details about that slice.
We can now see that there are 26 assets without a value for “asset type”.
Clicking on Edit filters and then Show Result displays the details about all the assets with no value for “asset type”. You can click the Edit Column button to display more columns or a different set of columns.
Clicking the blue > leads to the Details page, where you can view more information about a specific asset:
Clicking on a link on the left displays a different category of information about the asset.
You can also drill down into charts about users.
For example, suppose a dashboard includes this chart
Clicking on the bar “Security” drills down and provides details about that bar.
We can now see that there are 96 users in the security department.
Clicking on Edit filters and then Show Result displays the details about all the users in the security department. You can click the Edit Column button to display more columns or a different set of columns.
Clicking the blue > leads to the Details page, where you can view more information about a specific user:
Clicking on a link on the left displays a different category of information about the user.