Contact Us
If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.
noah.g@cyrisma.com
Article
Last Month
Version Version: 2.107.1.138 release features and updates of CYRISMA New Features Admin Scan Agents- Windows agents can now automatically be provisioned during installation using a configurable command line argument in the installation script. This means agents can be installed via automated scripting and provisioned without further intervention. Fo
CYRISMA Supported Operating Systems CYRISMA provides extensive support for a wide range of operating systems (OS), the document below details which OS versions are compatible with agent installation, vulnerability scanning, and secure baseline configurations.
Target Status Overview The Target Status Overview provides a snapshot of all targets in your instance, their scan status, and patch information. Navigate through tabs to view: Agents /Total Targets: Lists all agents and their associated targets. Unscanned Targets: Targets that have not yet undergone scanning. Patched Targets: Targets with successful
This guide addresses common issues and troubleshooting methods related to cloud-based scanning in the CYRISMA platform. Most challenges arise from improper Microsoft Office 365 or Google Workspace credential configurations during setup. Follow this troubleshooting guide to resolve issues effectively. 1. Common Cloud Scanning Issues 1.1. Scans Fail t
Step 1: Select Mitigation Plan Type Begin by choosing the type of scan from which the mitigation plan will be derived. Available options include: Data Vulnerability Secure Baseline Each type represents a different focus area for the mitigation effort, aligning the plan with scans conducted in these categories. Step 2: Mitigation Plan Creation 1. Mit
1. Scan Target Timeout Error Message: "Scan Target Timeout" Cause: This error occurs when target machines are either not checking in or are offline when the scan is initiated. Suggested Actions: Verify Machine Status: Ensure that the target machine is powered on and connected to the network to allow it to check in with the CYRISMA platform. Increase
Issue Summary Some users may encounter issues accessing the MSP login screen on the CYRISMA website. This is caused by a known bug with Google Analytics, which occasionally inserts a tracking link that can be misinterpreted as a malformed URI string by our Web Application Firewall (WAF) powered by Sucuri. As a result, Sucuri’s firewall may block acc
Key Components of the Industry Comparison Dashboard Overall Risk Score This score reflects the instance's overall cybersecurity risk level. It’s compared against the industry average to show how well the organization is managing risk relative to its peers. Individual Risk Scores by Category The following categories each display an individual risk sc
The "Inaccessible OVAL File" error occurs when the system is unable to download or access the vulnerability database during the scan. This prevents the scan from completing and causes it to be skipped. Suggested Actions to Resolve the Issue: Check Network Connectivity: Ensure that the machine being scanned has stable and reliable network connectivit
Vulnerability Risk Grade The Vulnerability Risk Grade displays the overall risk level based on the number and severity of vulnerabilities detected during scans. The primary grade shown corresponds to the current reporting period (e.g., Month or Quarter), while a smaller grade below represents the previous period, providing a quick comparison of impr
Managing Users in CYRISMA: Adding and Editing Users As an admin, you have the ability to manage user information in your organization. This guide will walk you through how to add new users and edit existing user details using the Admin > User Management feature. User Roles in CYRISMA When creating or editing a user, you must assign them a User Ro
Schedule a Scan: Creating and Managing Data Scans The "Schedule a Scan" page allows you to create new data scans or manage existing scan schedules for your instance. This structured, step-by-step process ensures that each data scan is tailored to your specific requirements. Step 1: Select Scan Type Begin by selecting the type of scan you'd like to p
Setting Up Integrations Navigate to Integrations: From the main menu, select Admin → Integrations. You will see options to configure credentials for Office 365 or Google. Office 365 Integration To configure Microsoft Office 365 API credentials: Fields to Configure: Application (Client) ID: The unique ID for the application in the Azure portal. Publi
Available GRC Assessments The following GRC assessments are available within CYRISMA: Copilot CIS Controls HIPAA PCI NIST CSF 2.0 Essential 8 UK Cyber Essentials CyberSecure Canada Key Features Completion Status: Track assessment progress, including the percentage completed and remaining questions. Risk Grades: View current and previous risk grades,
Dashboard Overview The Dark Web Monitor Results dashboard presents threat information in an organized, visual format with two main categories: Breach Type Displays the total number of breach incidents detected Provides a quick overview of the breach severity Forums/Marketplaces Shows mentions of your monitored assets in dark web forums and marketpla
Update Existing Users To update an existing user: Navigate to the User Management page. Select Update Existing User. Use the dropdown menu to locate and select the user you wish to edit. The Update User form will load with the user’s current details, which you can modify. Editable fields include: Full Name: Update the user's full name. Password: Ent
Multi-Factor Authentication (MFA) enhances account security by adding a second verification step. Depending on your organization’s setup, here are steps to resolve common MFA issues: 1. Email-Based MFA Issue: Not receiving the one-time passcode. Solution: Check your spam or junk folder, as MFA emails may be filtered there by your email client. 2. Au
Release Date: November 12, 2024 Version 2.97.1.128 release features and updates of CYRISMA New Feature ISO 27001 Compliance Assessment- Added a feature that allows users to evaluate their instance's compliance with the ISO 27001 standard. Fixes in User Experience and Functions Compliance Compliance Assessment- Enhanced navigation to automatically sc
Overview CYRISMA sends email alerts for various actions, including: Password resets Completed scans Mitigation plan creation, assignment, and overdue reminders And more These notifications are important for maintaining security and staying updated on actions within your instance. If you're not receiving these emails, follow the troubleshooting steps
System Config The System Config section in CYRISMA allows administrators to configure the system to meet organizational needs. While the default settings are functional, it’s recommended to tailor these configurations for optimal compliance and usability. System Configuration Settings Authentication Type: Default is set to "Local" for cloud-based in
Steps to Manage MFA Setup: Log in to the CYRISMA MSP Home Page: Use your credentials to sign into the MSP portal. Navigate to the Organization Details Page: On the Home Page, find and click on your organization. This will open the Organization Details page. Click the Update Button: On the Organization Details page, locate and click the Update button
This document provides an overview of the functionality of four essential patches implemented to address critical vulnerabilities in SSL/TLS protocols, cipher suites, and digital signature validation. Below, we detail the root causes, related CVEs, descriptions, and registry configurations for each patch. Disabling Obsolete SSL Versions (POODLE Vuln
Steps to Edit Organization Information: Log in to the CYRISMA MSP Home Page. Navigate to Admin > Organizations: On the left-hand menu, click on Admin. Select Organizations from the dropdown. Find Your Organization: Locate your organization in the list of organizations. In the organization row, click the pencil icon to open the editing form. Edit
The Mitigation Dashboard provides an overview of active and completed mitigation efforts across categories like Data Sensitivity, Vulnerability, and Secure Baseline. This guide outlines each section of the dashboard and the insights it provides. Mitigation Plans Overview This section presents a summary of all mitigation plans: Total: Total number
Steps to Remove an Instance Follow these steps to remove an instance from your CYRISMA environment: Log in to the CYRISMA MSP Home Page Access the CYRISMA MSP Home Page using your login credentials. Navigate to Instance Management On the navigation bar at the top of the page, click Instance to open the instance management menu. Click on Remove Insta
Built-in Departments The Built-in Departments section lists pre-configured departments provided by CYRISMA. These departments are fixed and cannot be edited or deleted. They are available for convenience and cover common organizational divisions, including: Billing Customer Service Executives Finance Human Resources Information Technology Legal Logi
What Operating System is the Agent installed on? Windows Mac Linux Navigate to C:\CYRISMA_Agent\logs There are no agent logs Only CYRISMA_Agent_Install.log is present CYRISMA_Agent_Install.log and Agent-logs are present Open a Terminal window in Admin mode. Run the command “powershell” and make sure PowerShell starts properly. Open a
Adding a New RegEx Data Sensitivity Scans use built-in scan categories, but if unique patterns need to be scanned, custom RegEx can be created. Add New RegEx: Click Add New RegEx in the Custom Regex section. Fill out the following fields: Name: Provide a meaningful name for the RegEx. Description: Add a brief description of the purpose of this RegEx
Report Builder Guide The Report Builder feature in CYRISMA allows users to generate detailed reports based on different scan types and criteria. Users can select from multiple report types, customize the content, and review previously generated reports. Selecting the Type of Report On the Report Builder page, you can choose from the following report
The Mitigation Review feature allows you to examine any mitigation plan, whether it’s open, closed, or historical. This is an essential tool for tracking progress, understanding assigned tasks, and gaining insights into completed or ongoing mitigation activities. Purpose of the "My Mitigation Plans" Section Highlights all mitigation plans assigned
Overview of Sub-Mitigation Plans Sub-Mitigation Plans allow mitigation efforts to be divided into smaller, more manageable segments. These segments can be assigned to different individuals within the same department, enabling enhanced teamwork and faster completion of the overall effort. Key Features of Sub-Mitigation Plans: Primary Plan Ownership:
1. Common Network Discovery Issues 1.1. Network Discovery Results Are Empty Symptoms: No devices detected after running a scan. Possible Causes: Agent placement issues. Incorrect IP range or subnet configuration. Firewall or IDS/IPS blocking traffic. Resolutions: Verify Agent Placement: Ensure the scanning agent resides within the same subnet as the
Navigating to the Reports Section To access the reports, follow these steps: Navigate to the "Reports" Menu: Locate the "Reports" tab in the navigation menu at the top of the page. Click on it to expand the available options. Select the "Overview" Report: From the dropdown menu, select "Overview". This action will open the Overview Report page. Over
The Suppressions feature in CYRISMA allows users to manage items that are either excluded on specific hosts (Local Suppressions) or across all hosts within the instance (Global Suppressions). The interface is organized into two tabs: Vulnerability: Displays suppressed vulnerabilities such as CVEs, open ports, or regulatory compliance requirements. S
The Agent Status page provides an overview of the health and status of agents and targets within your instance. This includes information on agent connectivity, version compliance, and scanning status of targets. Overall Health Score The Overall Health Score represents the health of the instance, calculated based on the number of agents deployed
Agents Overview The CYRISMA Agent serves as the primary data collector for CYRISMA instances. It operates in two modes: Agent-Based Scanning: The agent collects vulnerability, configuration, and sensitivity data from the host machine it is installed on. Each host requires an agent for these tasks. Agentless Scanning: The agent collects data from oth
Accessing AD Monitor Results Select Date Use the Select Date dropdown to choose the specific date for which the AD monitor results are displayed. Select AD Monitor From the Select AD Monitor dropdown, select the name of the AD monitor that ran on the chosen date. AD Monitor Result Sections The page is divided into sections that provide key informati
New Reporting Periods and Data Display At the start of a new month or quarter, your dashboard may display limited data until new scans are conducted within the current reporting period. During this time, you may notice that certain grade scores are missing or represented by a dash ("-") rather than a score. This is expected behavior due to how repor
1. Requesting Priority for Cloud Scans To utilize the CYRISMA Cloud Agent for data scans, you will need to submit a support ticket or contact us to specify which scans you would like prioritized. Once your request is received, we can ensure these scans are queued for earlier execution. 2. Using a Local Cloud Agent for Expedited Scans If you require
Deploying the CYRISMA Agent To deploy the CYRISMA Agent, ensure you have your CYRISMA instance URL and agent installation key ready. Steps in Google Admin Console: Log in to the Google Admin Console: Access the administrative interface at admin.google.com . In the left menu, navigate to Devices > Chrome > Apps & extensions. Select the User
Release Date: November 26, 2024 Version 2.99.1.130 release features and updates of CYRISMA Fixes in User Experience and Functions Admin Users- Renamed "Reassign Mitigation Plans" modal to "User Task Reassignment." Added support for reassigning scan completion notifications alongside mitigation plans when a user is deleted. Compliance Compliance Asse