LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page
  • CyberCyte Benefits
  • Main Modules
  • Cyber GRC
  • Continuous Security Testing
  • Exposure Management
  • Automation with the Power of AI

Was this helpful?

  1. Getting Started

Platform Overview

CyberCyte is an AI-driven threat exposure and GRC management platform (X-CTEM) that creates a unified posture for the internal and external attack surface. The platform acts as an early warning system to identify security gaps attackers can exploit for internal and external exposure. Based on ISO 27001, CIS, NIST, DORA, Cyber Essentials and other regulatory frameworks, it performs a consolidated maturity and compliance analysis for threats, vulnerabilities, and misconfigurations.

As a technology partner to major EDR/XDR vendors (Microsoft Defender, CrowdStrike, Palo Alto Cortex,…), vulnerability scanners (Nessus, Tenable, Acunetix, ZAP, etc.), and other key security solutions CyberCyte creates the most comprehensive exposure visibility for organisations. With the Power of AI, the platform empowers security teams to perform more by automating remediation and response actions.

CyberCyte Benefits

· Enable immediate identification of security gaps.

· Measure ransomware infection and information leakage risk by executing EDR and DLP effectiveness assessments covering all endpoints and servers.

· Validate the effectiveness of the existing security infrastructure and the security controls.

· Identify and remediate configuration gaps based on CIS, DoD, BSI, and MSFT security baselines.

· Create a centralized remediation and response infrastructure.

· Analyze unknown forensic artifacts to identify hidden threats and uncompliant activity.

· Track zero-day and exploited vulnerabilities.

· Map the impact of the discovered risks against standards like NIST, ISO 27001 and CIS through the GRC dashboard.

Main Modules

Cyber GRC

Simplify GRC management and streamline assessments for standards like ISO 27001, CIS, DORA and Cyber Essentials.

Continuous Security Testing

Continuously assess, consolidate and respond to threats, vulnerabilities and misconfigurations, enabling AI-powered false-positive elimination. Internal/External vulnerabilities, dark web presence, data leaks, CIS-based assessments and other exposure tests are performed.

Exposure Management

Unified internal and exposure analysis to discover unknown risks and shadow-IT.

Automation with the Power of AI

Empower security teams to perform more by automating routine tasks for remediation and response.

The platform provides a simple wizard for summarizing the main features of the platform. The wizard can be accessed anytime by clicking the wand icon on the top right section of the user interface.

The modules of the platform are accessible from the left menu.

  • Home provides the results of every artifact and asset analysis with dashboards. The dashboards are Threat Overview, Risk Analysis by Artifact, Risk Analysis by Rule Name, Risk Analysis by Asset, KPI Analysis, Windows Host Summary, and Unclassified Artifacts Analysis.

  • Threat Hunter provides Notable Events, Analysis & Investigation, Visualization, Hunting Settings, and E-Mail/Teams Settings.

  • Threat Response provides Response Management, Case/Incident Management, Remediation & Response Settings, and Case Management Settings.

  • Security Assurance provides Hardening & Configuration Management, Vulnerability Management, Remediation, Software Management, Remediation & Response Settings, and Hardening & Configuration Management Settings.

  • Asset Management provides Endpoint Management and Group Management.

  • Rules & Policies provides Artifact Classification, Policy Management, SIGMA/YARA Rules, and Artifact Collection Parameters.

  • GRC provides Assessment Management, Risk Management, Assets, Evidences, Parameters, and GRC settings.

  • Settings & Reporting provides Agents & Sensor Settings, Deployment Settings, Notification Settings, Integration Settings, Credential Settings, Organization Settings, Reporting, Users & Groups.

  • Troubleshooting provides an Event Log, Alert Log, Version & Exception Overview.

PreviousGetting StartedNextAgent Based Deployment

Last updated 27 days ago

Was this helpful?