Axiad Mesh End-user Onboarding
  • 13 Dec 2024
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Axiad Mesh End-user Onboarding

  • Dark
    Light
  • PDF

Article summary

Welcome to Axiad Mesh! As a first-time user, this is what you can expect.

Note

This is the onboarding experience for a Standard Mesh user (no administrative privileges in Axiad Mesh). For an admin user, please refer to the Axiad Mesh Admin Onboarding guide.

You can log into the tool by using the step-by-step guide below.

First Time Login

To kick off your Axiad journey, you will have access to the Axiad Mesh environment set up by your admins. You’ll receive an invite email from Axiad with a link that takes you directly to the web application.

  1. From the Axiad welcome email, click on the login link, which opens a web browser

  2. On the login page, enter your email address and click Next

  1. After you authenticate through your IdP, you will land on the Axiad Mesh homepage

    1. Depending on how much your admins have completed, you could immediately see the bubble chart visualization, or you may see a Things are getting set up page

Subsequent Logins

Once the Connectors are integrated, the homepage will display your identity ecosystem visualization so you can instantly see the overview of your environment.

  1. To log out of Axiad Mesh, simply click on your name in the top right corner and select Sign out

Welcome to Axiad Mesh

Once your Axiad Mesh dashboard is set up, you’ll be able to quickly get the necessary information that you need and options to dig deeper into each entity, identity, and potential risk.

Mesh Widgets

On the left-hand side of the application, you can see the quick reference widgets that give you an immediate snapshot of your environment and the world of cybersecurity.

The first widget is your organization’s overall risk score. This is generated from all of the individual risk scores from identities, applications, credentials, behavior, etc. and compiling them to create a top-level rating. Scores are 1 - 100, with 100 being the riskiest.

Here, you can also address profiling gaps (i.e. unconfirmed account associations) to get a more accurate risk score for your organization.

The next widget details your organization’s highest risks to help you understand why you have the score that you have. You can then use this information to improve your security posture and simultaneously lower your risk score.

The last widget includes an industry news feed to give you an immediate heads up to the latest happenings in the cybersecurity world.

Bubble Chart Overview

The main bubble chart visualization is made up of entities, each with their own risk score and organized by level of riskiness, with the highest risk bubbling up at the top.

The entity could be an application, location, authentication method, department, or something else that spans across your environment.

From here, you can hover over each bubble to get a preview of the assessment or click into an entity to get complete information about it, including risk score details, associated identities, potential blast radius, and more. You can also group entities together to see how they overlap and what risks are possible with those relationships.

Learn more

Check out more articles within the Axiad Mesh User Guide to see how you can turn this high-level overview into remedial actions.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.