company logo
Security Rating® Knowledge Base
    • Français
  • https://www.boardofcyber.io/
  • Français
Security Rating
  • Setup your account and manage your products.
    • Account
    • User
    • Product Management
  • Security Rating
    • Discover the Security Rating®
    • Setup the Security Rating
    • Dashboards' Mains features
    • Recommendations and further study
    • Asset Mapping
  • AD Rating
    • Set-up AD Rating
    • How the AD Rating agent works
  • Surveys
  • Advanced tests
      Back to home
      1. Security Rating® Knowledge Base
      2. Security Rating
      • Setup your account and manage your products.
        • Account
        • User
        • Product Management
      • Security Rating
        • Discover the Security Rating®
        • Setup the Security Rating
        • Dashboards' Mains features
        • Recommendations and further study
        • Asset Mapping
      • AD Rating
        • Set-up AD Rating
        • How the AD Rating agent works
      • Surveys
      • Advanced tests

      Security Rating

      Discover the strengths of Security Rating®, its objectives and principles. Understand the assessment process and the different tests.

      Discover the Security Rating®

      • Key points, objectives and principles of Security Rating®
      • Learn which tests are done and what are the tested public assets
      • How Security Rating® works
      • Understanding the Security Rating® improvement tool

      Setup the Security Rating

      • Add a company to evaluate
      • Setting up alerts
      • Understand how permissions work (tags)
      • Manage the companies and users' tags

      Dashboards' Mains features

      • Understanding the single-company dashboard
      • Understanding the multi-company dashboard
      • Understand the sector benchmark
      • Details of the different reports available
      • How to use the timeshift feature
      • Use of the filter system
      • Vulnerabilities and performance
      • Asset visualization
      See more

      Recommendations and further study

      • Wildcard et related risks
      • How to configure Akamai to confirm vulnerabilities by renegotiation
      • Activating the advanced probe
      • MAGENTO vulnerability
      • Understanding X509 Certificates used in Web/TLS
      See more

      Asset Mapping

      • Understanding mapping
      • Integrate changes detected by the system in the asset mapping
      • How to activate automatic mapping validations
      • Understanding how the asset mapping works
      • Discover the asset mapping management interface
      • Item segmentation
      • Manage your scope of analysis and understand the assets inclusion and exclusion lists
      See more
      company logo
      • linkedin_social_link_icon_alt_text
      • https://www.boardofcyber.io/