Contact Us
If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.
chris.z@cyrisma.com
Article
Last Month
Live Data Scan Display and Filtering For any scan that is currently running, the system displays it within a data scan table. The table provides essential information such as: Scan Name – The name assigned to the scan for easy identification. Targets – Number of targets being scanned. Data Type – Indicates the scan type (e.g., Local / CIFS-SMB). Loc
Step 1: Review CVSS Scores We begin by reviewing the CVSS (Common Vulnerability Scoring System) score assigned to each identified CVE (Common Vulnerabilities and Exposures). This score helps us understand the severity of each vulnerability. Step 2: Analyze Vulnerability Percentage per Host Next, we calculate the percentage of vulnerabilities found f
Navigating the Vulnerability Scan History At the top of the page, there is a Select Scan Type filter bar, allowing you to categorize the scan history by specific scan types. These categories include: All Scans: Displays every scan conducted, across all types. Internal Authenticated: Shows scans conducted internally with authentication credentials. I
Overview: Accessing logs is essential for troubleshooting and monitoring the performance of the CYRISMA Agent. This article provides guidance on where to find your logs on the system. Finding Your Logs To locate your logs, follow these simple steps: Open File Explorer: Click on the File Explorer icon on your taskbar or press Windows + E on your keyb
Key Features and Functionalities of the Updated Dashboard 1. Instance Risk Overview The dashboard provides a high-level overview of critical organizational metrics, including: Risk Score: Displays the risk grade for the organization. Data Sensitivity: Highlights sensitive data types identified, such as credit card numbers, social security numbers, a
Key Support Note 1. Agent Fails During Initial Provisioning If the agent fails while being initially provisioned, it is important to check that the "Server" service is running on the host machine where the agent is being installed. How to Check: Open the Services console on the host machine (you can do this by typing services.msc in the Run dialog o
Steps to Install the CYRISMA Linux Agent (Debian Distributions) Download the Agent Package Log in to your CYRISMA instance. Navigate to Admin > Scan Agents in the CYRISMA App UI. Download the CyBroker_Linux_Installer.deb file for Debian distributions. By default, the downloaded package will be saved in the Downloads folder under the current user'
Steps to Scan a Linux /NAS Device Add the NAS/ Linux Device as a Target If the target device (Linux/NAS) was not identified during a discovery scan, you can manually add it as a target: Navigate to Admin > Targets in your CYRISMA instance. On the Targets page, click Add New Target. Manually fill out the target form by providing the IP address or
Steps to Refresh the MSP Interface Cache Refresh with Keyboard Shortcuts For Windows: Press Ctrl + F5. For Mac: Press Cmd + Shift + R. Check for Instance Availability After refreshing, your instances should appear. If not, repeat the process up to two times to ensure the cache is completely cleared.
Downloading the CYRISMA Agent To download the CYRISMA Agent package: Log in to your CYRISMA instance. Navigate to Admin > Scan Agents. Choose the appropriate installer based on your Mac's architecture: Intel x64: CyBroker_Installer.pkg Arm 64 (Apple M1/M2/M3): CyBroker_Installer_Arm64.pkg Granting Full-Disk Access to the Installer Important Note:
Automatic Updating of CYRISMA Agents There are two key conditions under which CYRISMA agents will check their version and apply updates: 1. 3 AM Automatic Check Each day at 3 AM, the agent will automatically check if an update is required, provided the host machine is powered on and awake. If the host machine is sleeping or shut down at 3 AM every d
Overview The CYRISMA Platform Status Page provides real-time information on the platform's uptime and performance, ensuring you stay informed of any service updates. View Live Status Uptime Monitor Dashboard: For the latest information on platform availability and performance, visit our live uptime dashboard here: View CYRISMA Uptime Monitor Dashb
Any existing data scans that have either been completed or cancelled are shown within the data scan history table shown below. As a default, the scan history display will default to show 5 results. However, depending on the volume of scans you have performed previously, there are additional features allowing you to apply a filter for any particular
Title: Locating and Generating the Risk Assessment Report in CYRISMA Overview The Risk Assessment Report in CYRISMA offers a detailed view of an organization's risk posture. This guide explains the steps to locate and generate the Cyber Risk Assessment Report within a client instance. Updated Steps to Generate the Risk Assessment Report Log into the
Release Date: December 30, 2024 Version 2.101.1.132 release features and updates of CYRISMA New Feature: NIST 800-53 Compliance Assessment- Added a feature that allows users to evaluate their instance's compliance with the NIST 800-53 standard. Fixes in User Experience and Functions: Data Scan Scan History- Resolved an issue where the doughnut ch
To upload a custom logo, you will need to: Go to the Instance On the main Organization details page select Update next to the address section. Then select Upload Custom Logo From there you will be able to change the logo of the organization.
There are three ways to uninstall the windows CYRISMA Agent: 1. Navigate to the C:\ > CYRISMA_Agent > From here you will see the file name "unins000.exe". Double Click the file and follow the on-screen instructions. 2. In your RMM console you can create an uninstall script. In the script you will have the following to be executed: "C:\CYRISMA_
Steps to Resolve the Issue Follow these steps to resolve the issue in the Google Admin console: Sign in to the Google Admin Console Access your Google Admin account at admin.google.com . Navigate to Google Workspace Settings Click on Home > Apps > Google Workspace. Ensure that Drive and Docs are set to ON for everyone in your organization. Ena
Overview: Understanding user roles is crucial for managing access and functionality within the CYRISMA platform. This article outlines where to find detailed information about each user role and their permissions. Accessing User Roles Information 1. Organizational Dashboard The Organizational Dashboard, also known as the Service Provider Interface,
Download Document Connectwise Integration Autotask Integration *Reference link below: https://static.helpjuice.com/helpjuice_production/uploads/upload/image/22751/4544765/CYRISMA%2BPSA%2BSetup%2BGuide%2B_1_.pdf
Accessing Microsoft Secure Score Navigate to Secure Score Dashboard Go to the main menu and select Compliance > Microsoft Secure Score. Key Features of the Microsoft Secure Score Dashboard Risk Grades Displays your current and previous risk grades for your Microsoft Cloud configuration. The previous grade appears below the current grade in a smal
Benchmark Sources Secure Baseline Lookup supports two primary benchmark sources: CISecurity Benchmarks: These are widely used in commercial and business environments. DISA STIG (Security Technical Implementation Guides): Designed for defense and government use cases. By default, most businesses utilize CISecurity benchmarks, which align with best pr
First Response Time (FRT): We aim to acknowledge your inquiry within 1-2 hours during business hours. This initial response will confirm receipt of your request and provide an estimated timeline for resolution. Average Resolution Time: Simple Issues: For straightforward issues, we strive to resolve them within 24-48 hours. These include minor techni
Steps to Install the CYRISMA Agent for Windows Ensure You Have Admin RightsMake sure you are logged in with administrative rights on the device where you will install the agent. Download the Installer Log in to your CYRISMA instance. Navigate to Admin > Scan Agents and download the Cyrisma_setup.exe from the Agent Download section. Run the Instal
Step-by-Step Deployment Guide 1. Prepare the Netlogon Folder On a Domain Controller, navigate to the Netlogon folder. Create a folder named CYRISMA. Ensure this folder replicates across all domain controllers in the network. 2. Add the CYRISMA Installer Download CYRISMA_Setup.exe from the CYRISMA portal. Place the downloaded file in the CYRISMA fold
Using Vulnerability Lookup Performing a CVE Search: Enter a specific CVE number into the search bar. This helps in narrowing down the results and focusing on the exact vulnerability you wish to investigate. Click SEARCH to display detailed information about the specified vulnerability. Understanding the Results: The search results will display a bri
Important Considerations Uninstalling the agent from a computer or removing the computer from the network will not automatically remove the agent or target configurations from the CYRISMA Web Platform. If the agent host machine is still on the network, you have two options: Uninstall the agent software manually and delete the agent configuration in
This is usually a cache issue make sure you do the following: when you login into the MSP interface press "left ctrl + f5" if you are windows or if your MAC press Cmd+Shift+R you should see your instances, once the page refreshes You may need to do this max of 2 times to make sure that the cache is totally clear for the MSP interface