LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page
  • With Scanner Component
  • CyberCyte Intel

Was this helpful?

  1. Getting Started

Enabling External Exposure Analysis

PreviousHow to Use CyberCyte Platform Effectively?NextAdministration Guide

Last updated 3 months ago

Was this helpful?

External Exposure refers to an organization’s internet-facing systems, services, or assets that are vulnerable to potential threats. Open ports, weak APIs, DNS misconfigurations, and outdated applications expand the attack surface, making them attractive targets for external threats. Continuous monitoring, regular vulnerability assessments, and proper configurations are essential to mitigate these risks effectively. CyberCyte provides a continuous analysis solution for external exposure.


The module has two separeted component. First one is "Scanner Component" and second one is "CyberCyte Intel". The "Scanner Component" should be installed on the customer's environment if they are using CyberCyte portal with on-premise deployment. The "CyberCyte Intel" is designed for cloud-based deployments.

With Scanner Component

This section is designed for after steps of the scanner component deployment. The CyberCyte IT team will deploy the scanner on the customer side and after that these steps should be applied one by one:

  • First of all, please contact with the CyberCyte IT support. The module will configure with customer requirements.

  • Login to the CyberCyte portal.

  • Navigate to "Rules & Policies" -> "Policy Management" -> Search for "External Asset Discovery Default Policy" with search bar. Click on the policy or click on the three dots on the right side of the policy and click on "Edit".

  • In the policy:

    • The default scan interval is 24 hours, but it can be changed.

    • Users need to provide the domain address to the policy.

    • "Execute Vulnerability Scan" option should be enabled.

  • Click on the "Save" button and make sure to provide domain addresses to CyberCyte IT support.

Next steps for CyberCyte portal admins, normal users cannot be acces to the "MSSP" organization.

  • After configuration of the policy, please change organization to "MSSP".

  • Please navigate to "Asset Mgmt. & Threat Intel" -> "External Exposure Scanner Settings".

  • Click on the three dots at the right side of the grid and click on "Edit" button.

  • On the "Assigned Organizations" section, please select the organization(s).

  • Please make sure "Tenable Nessus Address", "Tenable Nessus Access Key" and "Tenable Nessus Secret Key" is provided.

  • Click on the "Save" button and wait for the results. The data should be appear in a day.

  • Please switch back to users organization and navigate to "Most Used" -> "External Exposure Overview". The data's will be displayed on this page, click on the entries that displayed on the grid. This action take user to specific analysis grid.

CyberCyte Intel

This section is designed for cloud-based deployments, but cloud-based deployment can also use the "Scanner Component" because it is already integrated with CyberCyte's cloud portal. Please let the CyberCyte IT team for external exposure analysis, CyberCyte IT team will take care of the assignments. The data will be collected in a day and users can be observe the results under the "Most Used" -> "External Exposure Overview" dashboard.

Next steps for CyberCyte portal admins, normal users cannot be access to the CyberCyte Intel.

  • Please login to CyberCyte Intel and navigate to "SUPERORG Management" -> "External Exposure" -> "Queries".

  • Click on the "+ Query" button to create a query. The "Query" section should be a domain name provided by customer. Also, please enable the "Enabled" option and click on the "Save" button.

  • The results can be observe from customer's organization and also on the CyberCyte Intel. On the "SUPERORG Management" -> "External Exposure" page, click on "All Data", "Cybersquatting" or one of the available sections. These sections will show all of the query results under one grid.