Use the Clarity Dashboard

The Clarity Dashboard analyzes information stored in BeyondInsight's centralized database, which contains data gathered from across any or all BeyondInsight supported solutions deployed in the customer environment. These include:

  • Endpoint Privilege Management
  • Privilege Management for Unix & Linux
  • BeyondTrust Discovery Scanner

Triggers

The Triggers list displays the total number of events which are affected by each trigger. The following triggers identify assets that are at risk.

Malware and attack vulnerability risk detection features have been deprecated in BeyondInsight and no longer function. Options relating to malware and attack risk data are being removed in a future release.
Trigger Description
Untrusted User

Triggers when potentially untrusted users log into Administrator or local accounts. Can be triggered by events in the following products:

  • Endpoint Privilege Management
  • Privilege Management for Unix & Linux
  • BeyondTrustDiscovery Scanner
First Password Request
  • Password Safe events
  • User requests password for a managed account and system they have never requested before
Outlier

Triggers when an event is determined to be an outlier based on Clarity analysis. Can be triggered by events in the following products:

  • Endpoint Privilege Management
  • Privilege Management for Unix & Linux
  • Password Safe
  • BeyondTrust Discovery Scanner
Unusual Password Release Request
  • Password Safe events
  • User does not retrieve the password for approved request or the password is retrieved more than once
Concurrent Password Release Request
  • Password Safe events
  • Triggers if a user requests more than one password at the same time.
Untrusted Application
  • Endpoint Privilege Management events.
  • Triggers when unsigned and un-versioned applications are found on system.
First Application Launch

Triggers when an application is launched for the first time. Can be triggered by events in the following products:

  • Endpoint Privilege Management
  • Privilege Management for Unix & Linux
  • User launches an application they have never launched before

If a trigger has events, you can click the trigger to view the risk events that make up the count.

Risk Events by Threat Level

Drill into the risk events to learn more about the event, such as the trigger, type of event, or severity. Use the Tab key to navigate through the areas on the page and to view the metrics on the bubbles.