DeepSurface

Documentation
Installation Guide
Overview
Let DeepSurface Host For You
Getting Started
System Requirements
Self Hosted Quick Start - Installing to Cloud Platforms
Self Hosted - Installation Using an OVA
Registration, Package Installation, and Initialization
First Steps After Initialization of the Console
Deployment Options
Main and Subordinate Consoles
Agent-Based Deployment
User Managed Scan Deployment
Credentialed Scanning Deployment
Mixed Environment
Deployment Tools
Active Directory Group Policy
Microsoft Endpoint Configuration Manager (part of InTune)
Tanium Deploy
HCL BigFix
Ivanti
Virtual Machines
VMWare
Virtual Box
VirtualBox Guest Additions
AWS EC2 (BYOL)
AWS EC2 (Usage Based)
Azure Cloud
Google Cloud
Additional Items to Consider
Main Console Server Certificates
LDAP
TOFU
Clock Sync
DeepSurface Commands
Multiple Vulnerability Sources
API Documentation
User Guide
Reporting
Dashboards
Exports
Risk Insight
Hosts
Patches
Vulnerabilities
Vulnerability Instances
Users
Remediation Workflow Manager
Plans
Settings
Integrations
Workflow
Exporting
Accepted Risk Plans
Accepted Risk Workflow
Explore
Model
Paths
Activity
Tasks
Configuration Alerts
Scan Logs
Notification Settings
Scanning
Status
Agents
User Managed
Credentialed Scanning Settings
Credentials
Scan Groups
General Settings
Cloud Scanning
Network Connectivity
Subordinates
Vulnerability Sources
Setup
Sensitive Assets: Polices
Sensitive Assets: Manual
Admin Settings
SMTP Settings
Certificates
Outbound Proxy
Authentication Providers
Users
Tags
Integrations Guide
Vulnerability Sources
CrowdStrike Spotlight
SentinelOne
Carbon Black Cloud
Microsoft Defender for Endpoint
Wazuh
Lansweeper Cloud
Nessus API
Tenable.io API
Security Center/Tenable.sc API
Rapid7 InsightVM API
Qualys API
Nozomi Guardian
Eclypsium
AWS Inspector
Remediation
Jira Software
Tanium (BETA)
Authentication Providers
LDAP (Active Directory)
SAML (Azure Active Directory)
SAML (Google)
SAML (Okta)
PAM
CyberArk
Delinea (Thycotic)
Microsoft LAPS
Security Guide
Firewall Configuration
Base Network Requirements
Agent Network Requirements
Credentialed Scanning Network Requirements
API Network Requirements
How DeepSurface Scans Work
Domain (LDAP) Scanning
Host Scanning Routine
Reasons for the Administrative Access Requirement
Endpoint Protection Considerations
Other Items
Scope of Data Storage and Retention
IPS/IDS Considerations
Logging
Resetting the DSADMIN password
Product Information
Changelogs
Open source Licenses
End User License Agreement (EULA)

More filtering capabilities are being added all the time to the Risk Insight reports and DeepSurface has a powerful filter building interface for applying multiple filters at the same time in order to get exactly the data that you need from the reports. By default, a risk insight report might look something like the following example vulnerabilities report:

Filtering 1

Creating Filters

To begin adding filters, locate the "+" Add filter button above the visual breakdown of the vulnerabilities. Clicking the button ( or using the kyboard shortcut alt + f )will reveal a list of all the available filters that can be applied to this report. To select a filter to apply you have a few options. It is possible to scroll through the list of attributes and select the one to filter on with the mouse, but you also have some quicker options. Instead of using the mouse, you can use the arrow keys to move up and down the list, and hit the "Enter" key to select the option you want. Iy is also possible to start typing what you want to filter on and the list of options will shrink to match what you have typed, making it easier to find what you want.

filtering 2 filtering 5

After selecting an attribute to filter on, you can choose what filtering operation to use and then apply the value of the filter. The available operations and types of values that can be entered depend on what you are attempting to filter on. The different operations currently available are:

Not all options are available for all attributes and if only one option is available, then the user will not be able to select what operation to use.

filtering 3 filtering 7

What values can be entered are also dependent on what attribute is being filered on. It may be a number, a keyword, a specific option, multiple options, etc.

filtering 4 filtering 6

Regardless of what the available options are, once a value or value(s) are entered, the filter can be created and the button to apply it will appear. Click the button and the filter will be applied and the filter builder will close. The report will now show a pill that indicates that it is being filtered by this newly created filter. Repeat this process until you are happy with the filters applied. Each of the applied filters can be removed at any time and the report will refresh automatically any time the filters change.

Ordering the results

There are 2 ways to order the results. The lower half of the page shows a table of results. If the results can be ordered by a column in the table, up and down ordering arrows will be present in the header of that column. Clicking on the column header will toggle between ordering by that column ascending or descending. Sometimes ordering by specific columns will adjust what visual appears above the table. The title above the visual will always indicate what the results are being ordered by and the legend for the visual will indicate the breakdown of the visual. An example of vulnerabilities being ordered by exploit status descending might look something like this:

Filtering 1

whereas filtering the same results by affected hosts might look something like this:

Filtering 1

To order by multiple columns (2 at this point), there is an ordering icon above the table that when opened will allow you to select more than one column to order by. There is also an options menu to add or remove certain columns from the results. Not all columns can be added and removed at will, but the available columns will change and grow over time.

filtering 4 filtering 6