Difference between revisions of "System Security Summary"

From SmartWiki
Jump to: navigation, search
Line 29: Line 29:
  
 
:: [[File:Sys security summary buttons.png|border]] 
 
:: [[File:Sys security summary buttons.png|border]] 
* The '''right arrow '''allows you to go back to the last page that you were from (typically the [[Global Settings]] page from which you accessed the '''System Security Summary.'''
+
:
* Clicking the '''drop down arrow '''will allow you to choose from a list of several of the most recent pages you accessed.
+
:* The '''right arrow '''allows you to go back to the last page that you were from (typically the [[Global Settings]] page from which you accessed the '''System Security Summary.'''
* The '''printer icon '''will allow you to print a  PDF report of all the system security summary information in the same list and structure as is organized on the page in the platform. 
+
:* Clicking the '''drop down arrow '''will allow you to choose from a list of several of the most recent pages you accessed.
 
+
:* The '''printer icon '''will allow you to print a  PDF report of all the system security summary information in the same list and structure as is organized on the page in the platform. 
 
Below these buttons and right underneath the '''System Security Summary '''title, you will see the following information: 
 
Below these buttons and right underneath the '''System Security Summary '''title, you will see the following information: 
 
+
::: [[File:Sys security summary top 20219.png|thumb|none|300px|The System Security Summary settings displayed at the top of your page.]]
:: [[File:Sys security summary top 20219.png|thumb|none|300px|The System Security Summary settings displayed at the top of your page.]]
 
 
{| class="wikitable"
 
{| class="wikitable"
 
|-
 
|-
Line 60: Line 59:
 
Below these top notifications is the [[List View Overview|list view]] of System Security features. 
 
Below these top notifications is the [[List View Overview|list view]] of System Security features. 
  
:: [[File:Sys security summary list view.png|thumb|none|1000px|List view of System Security features.]]
+
::: [[File:Sys security summary list view.png|thumb|none|1000px|List view of System Security features.]]
 
The columns included in the list view for System Security are each explained below: 
 
The columns included in the list view for System Security are each explained below: 
  
Line 70: Line 69:
 
||'''Attention Required'''
 
||'''Attention Required'''
 
||
 
||
[[File:Sys security summary attention required icon 2019.png]] - '''Attention Required: '''If attention is required on a system item, 
+
[[File:Sys security summary attention required icon 2019.png]] - '''Attention Required: '''If attention is required on a system item, there will be a warning icon. 
  
[[File:Sys security summary approved icon 2019.png]] - '''Safe: '''
+
[[File:Sys security summary approved icon 2019.png]] - '''Safe: '''If no attention is required on a system item, there will be a green check mark icon. 
  
 
|-
 
|-
 
||'''Severity'''
 
||'''Severity'''
||'''High, Medium '''and '''Low '''severity level
+
||'''High, Medium '''and '''Low '''severity level will be listed for items that correspond to the level of need. 
 
|-
 
|-
 
||'''Area'''
 
||'''Area'''
 
||
 
||
'''Base -'''
+
'''Base - '''
  
 
'''UTA - '''
 
'''UTA - '''
 
  
 
|-
 
|-
Line 98: Line 96:
 
|-
 
|-
 
||'''Feature'''
 
||'''Feature'''
||The name of the security feature. Some examples might include [[List Views Overview|Classic List Views]], [[
+
||The name of the security feature. Some examples might include [[List Views Overview|Classic List Views]], Arcadia Interface, Disable Login Token Check, Enable Desktop API, Reports, Password Policy, Enable SSL, and more./ 
 
|-
 
|-
 
||'''Details'''
 
||'''Details'''

Revision as of 14:48, 10 July 2019


Construction warning.png Please note that this page is currently under construction. There is more information to come.


Overview

The System Security Summary is a useful feature in your SmartSimple instance that allows you to review the access risk of your current instance configuration.

Accessing the System Security Summary

To access the System Security Summary, follow these steps:

1. Click on the 9-square menu icon on the top right of your page.

052919 MenuIcon.png

2. Under the heading Configuration, select Global Settings.

3. Under the first tab (labelled System) scroll down to the bottom of the page to the subsection labelled System Log and Summary.

4. Click on the hyperlink labelled System Security Summary.

The System Security Summary hyperlink found under System Log and Summary

System Security Summary Features

When you open the System Security Summary, you will see a page displayed with details similar to those in the image below:

The System Security Summary page

The System Security Summary has different components.

At the very top left of your page are two buttons:

Sys security summary buttons.png 
  • The right arrow allows you to go back to the last page that you were from (typically the Global Settings page from which you accessed the System Security Summary.
  • Clicking the drop down arrow will allow you to choose from a list of several of the most recent pages you accessed.
  • The printer icon will allow you to print a  PDF report of all the system security summary information in the same list and structure as is organized on the page in the platform. 

Below these buttons and right underneath the System Security Summary title, you will see the following information: 

The System Security Summary settings displayed at the top of your page.
Date The time and date stamp of when the system security summary was most recently run - this will be the time that you clicked into the System Security Summary hyperlink from Global Settings.
Result This will be the result generated from your most recent run of the system security. It will either be a FAIL (red) or PASS (green). 
Items Flagged

High - The number of items in the system that the system security counts as high severity. It is highly recommended to change the security settings on high severity items; otherwise, your system security is vulnerable and insecure. 

Medium - The number of items in the system that the system security counts as medium severity. It is recommended to change the security settings on medium severity items to improve your overall system security. 

Low - The number of items in the system that the system security summary counts as low severity; you are recommended to change the security settings on these low severity items, but it will not be a critical detriment to your overall system security. 

Optional - These are the number of items in the system that the system security does not mandate you need to improve the security on. You can choose whether or not you want to increase the security settings on these items. 

The following criteria must be met in order to pass This text box that appears at the top of your System Security Summary page will give you a list of the steps necessary in order to change your security status from FAIL to PASS. In this example, for instance, a System Administrator should resolve all high severity items and all medium severity items. Once they do so, running their System Security Summary again should ensure that they get a PASS status. 

Below these top notifications is the list view of System Security features. 

List view of System Security features.

The columns included in the list view for System Security are each explained below: 

Column Function
Attention Required

Sys security summary attention required icon 2019.pngAttention Required: If attention is required on a system item, there will be a warning icon. 

Sys security summary approved icon 2019.pngSafe: If no attention is required on a system item, there will be a green check mark icon. 

Severity High, Medium and Low severity level will be listed for items that correspond to the level of need. 
Area

Base - 

UTA - 

Category

Business Security -

System Security - 

Usability - 

Security - 

Feature The name of the security feature. Some examples might include Classic List Views, Arcadia Interface, Disable Login Token Check, Enable Desktop API, Reports, Password Policy, Enable SSL, and more./ 
Details
URL URL button sys security.png